1. S. Northcutt, J. Novak, Network Intrusion Detection, New Riders/Pearson, Indianapolis, IN, third ed., 2003.
2. D. Moore, C. Shannon, J. Brown, Code-red: a case study on the spread and victims of an internet worm, in: Proceedings of the second ACM Internet Measurement Workshop, 2002.
3. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, The spread of the sapphire/slammer worm technical report, CAIDA Technical Report, 2003.
4. S. Axelsson, Intrusion detection systems: a survey and taxonomy, Chalmers University Technical Report, March 2000 pp. 99–15.
5. P. Porras, P. Neumann, EMERALD: event monitoring enabling responses to anomalous live disturbances, in: Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD, October, 1997, pp. 353–365.