1. C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: Alternative data models, in: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 1999, pp. 133–45.
2. X. Hoang, J. Hu, An efficient Hidden Markov Model training scheme for anomaly intrusion detection of server applications based on system calls, in: IEEE International Conference on Networks, ICON, vol. 2, Singapore, 2004, pp. 470–474.
3. V. Chandola, A. Banerjee, V. Kumar, Anomaly detection for discrete sequences: a survey, Technical Report TR 09-015, University of Minnesota, Department of Computer Science and Engineering, 2009.
4. Nonlinear neural networks: principles, mechanisms and architectures;Grossberg;Neural Networks,1988
5. Learn++: an incremental learning algorithm for supervised neural networks;Polikar;IEEE Transactions on Systems, Man and Cybernetics, Part C,2001