1. Intrusion detection systems: a survey and taxonomy. Technical report 99-15;Axelsson,2000
2. The base-rate fallacy and the difficulty of intrusion detection;Axelsson;ACM Transactions on Information Systems and Security,2000
3. Improving attack detection in host-based IDS by learning properties of system call arguments. Technical report SECLAB-05-03;Chaturvedi,2005
4. Certification of programs for secure information flow;Denning;Communication of the ACM,1977
5. An intrusion detection model;Denning;IEEE Transactions on Software Engineering,1987