1. A method for fuzzy rules extraction directly from numerical data and its application to pattern classification;Abe;IEEE Trans. Fuzzy Syst.,1995
2. Ahmed, A.A.E., Traore, lssa, 2005. Anomaly intrusion detection based on biometrics. In: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY.
3. Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A., 1995. Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES). SRI-CSL-95-06, SRI International, Menlo Park, CA.
4. Axelsson, S., 2000a. Intrusion detection systems: a survey and taxonomy. Technical report no. 99-15, Department of Computer Engineering, Chalmers University of Technology, Sweden.
5. The base-rate fallacy and the difficulty of intrusion detection;Axelsson;ACM Trans. Inform. Syst. Security,2000