1. K. Ahsan, D. Kundur, Practical Data Hiding in TCP/IP, in: Proc. Workshop on Multimedia Security at ACM Multimedia, French Riviera, 2002, pp. 7–19.
2. Detecting Unusual Program Behavior Using the Statistical Component of the Next-Generation Intrusion Detection, SRI-CSL-95-06;Anderson,1995
3. O. Arkin., xprobe, 2004, .
4. Locally weighted learning for control;Atkeson;AI Review,1996
5. Supervised learning on a fuzzy Petri net;Konar;Information Sciences,2005