1. Computer security threat monitoring and surveillance;Anderson,1980
2. Anderson, D., Lunt, T. F., Javits, H., Tamaru, A., & Valdes, A. (1995). Detecting unusual program behavior using the statistical components of NIDES. NIDES Technical report. SRI International.
3. DADICC: Intelligent system for anomaly detection in a combined cycle gas turbine plant;Arranz;Expert Systems with Applications,2008
4. Barbard, D., Wu, N., & Jajodia, S. (2001). Detecting novel network intrusions using Bayes estimators. In Proceedings of the first SIAM international conference on data mining.
5. Feature deduction and ensemble design of intrusion detection systems;Chebrolu;Computers and Security,2005