1. Debar H, Dacier M, Wespi A. A revised taxonomy of intrusion-detection systems. Annales des Telecommunications. 2000;55(7–8):361-337
2. Gong Y, Mabu S, Chen C, Wang Y, Hirasawa K. Intrusion detection system combining misuse detection and anomaly detection using genetic network programming. In: ICCAS-SICE. 2009
3. Hall J, Barbeau M, Kranakis E. Anomaly-based intrusion detection using mobility profiles of public transportation users. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. 2005
4. Lee J, Moskovics S, Silacci L. A survey of intrusion detection analysis methods. CSE 221, University of California, San Diego, Spring 1999
5. Prayote A. Knowledge-based anomaly detection [PhD dissertation]. School of Computer Science and Engineering, The University of New South Wales; 2007