1. A hybrid machine learning approach to network anomaly detection;Shon;Information Sciences,2007
2. Cryptography and Network Security Principles and Practices;Stallings,2006
3. Network Intrusion Detection: An Analyst's Handbook;Northcutt,2000
4. W. Lee, S.J. Stolfo, P.K. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, J. Zhang, Real time data mining-based intrusion detection, in: Proceedings of the DARPA Information Survivability Conference & Exposition II, Anaheim, USA, June 12–14, 2001, pp. 89–100.
5. P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, P.-N. Tan, Data mining for network intrusion detection, in: Proceedings of NSF Workshop on Next Generation Data Mining, 2002.