1. Identifying enterprise network vulnerabilities;Myerson;International Journal of Network Management,2002
2. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, The spread of the sapphire/slammer worm, in: Technical Report, International Computer Science Institute - University of California at Berkeley, 2003.
3. Real-time Systems: Design Principles for Distributed Embedded Applications;Kopetz,1997
4. Processing of massive audit data streams for real-time anomaly intrusion detection;Wang;Computer Communications,2008
5. Fast detection of scanning worm infections;Schechter,2004