1. Application of SVM and ANN for intrusion detection;Chen;Computers and Operations Research,2005
2. Forrest, S., Hofmeyr, S A., Somayaji, A., Longstaff, T A. (1996). A sense of self for UNIX processes. In Proceedings of the 1996 IEEE symposium on security and privacy.
3. A clustering-based method for unsupervised intrusion detections;Jiang;Pattern Recognition Letters,2006
4. Lee, W., Stolfo, S J. (1998). Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX security symposium San Antonio, Texas.
5. Lee, W., Stolfo, S J., Chan, P K. (1997). Learning patterns from Unix process execution traces for intrusion detection. In Proceedings of AAAI97 workshop on AI methods in fraud and risk management.