1. Alapaholuoma T, Nieminen J, Ylinen J, Seppl T, Loula P. A behavior-based method for rationalizing the amount of ids alert data. In: Proceedings of the seventh international Multi-Conference on Computing in the Global Information Technology, ICCGI 2012; 2012. p. 302–7.
2. Intrusion detection alarms reduction using root cause analysis and clustering;Almamory;Computer Communications,2009
3. Aggregation and correlation of intrusion-detection alerts;Debar,2001
4. Dshield database;DShield,2012
5. Intrusion behavior detection through visualization;Erbacher;Systems, Man and Cybernetics, IEEE International Conference on,2003