1. Anderson, J. P. (1980). Computer security threat monitoring and surveillance. Technical Report, Fort Washington, PA, USA.
2. An introduction to neural networks;Anderson,1995
3. The base-rate fallacy and the difficulty of intrusion detection;Axelsson;ACM Transaction on Information and System Security,2003
4. Barbard, D., Wu, N., & Jajodia, S. (2001). Detecting novel network intrusions using Bayes estimators. In: Proceedings of the first SIAM international conference on data mining (pp. 1–17).
5. Critical study of neural networks in detecting intrusions;Beghdad;Computers and Security,2008