1. Computer security threat monitoring and surveillance;Anderson,1980
2. An architecture for intrusion detection using autonomous agents;Balasubramaniyan,1998
3. NIDX: an expert system for real-time network intrusion detection;Bauer,1988
4. Implementation of an intrusion detection system based on mobile agents;Bernardes,2000
5. Honeypots: why we need a dynamic honeypot?;Budiarto,2004