1. Anderson, J. P. (1980). Computer security threat monitoring and surveillance. Technical Report, 98 (17). Fort Washington, PA, USA: James P Anderson Co.
2. Adaptive real-time anomaly detection with incremental clustering;Burbeck;Information Security Technical Report,2007
3. Denning, D. E., & Neumann, P. G. (1985). Requirements and model for IDES-A real-time intrusion detection system. Technical Report, Computer Science Laboratory. Menlo Park, CA: SRI International.
4. Eskin, E. (2000). Anomaly detection over noisy data using learned probability distributions. In Proceedings of the international conference on machine learning (pp. 255–262).
5. Fei, R., Hu, L., & Liang, H. (2008). Using density-based incremental clustering for anomaly detection. In Proceedings of the 2008 international conference on computer science and software engineering (Vol. 3, pp. 986–989).