1. Immune system approaches to intrusion detection – A review;Aickelin,2004
2. Introduction to machine learning;Alpaydin,2004
3. Anderson, James P. (1980). Computer security threat monitoring and surveillance, technical report, James P. Anderson Co., Fort Washington, Pennsylvania.
4. Bace, Rebecca G. (2002). NIST special publication on intrusion detection systems.
5. Ben Amor, Nahla, Benferhat Rue, Salem, Elouedi, Zied. (2004). Naı¨ve Bayes. vs. decision trees. In: Symposium on applied computing proceedings of the 2004 ACM symposium on applied computing.