1. An introduction to neural networks;Anderson,1995
2. Cannady J. (1998). Artificial neural networks for misuse detection, Proceedings of the 1998 National Information Systems Security Conference (NISSC'98), (pp. 443–456). Arlington, VA.
3. Clare A. (2003). Machine learning and data mining for yeast functional genomics, PhD Thesis, Department of Computer Science University of Wales, Aberystwyth.
4. DARPA Intrusion Detection Evaluation, MIT Lincoln Laboratory, (http://www.ll.mit.edu/IST/ideval).
5. An introduction to the bootstrap;Efron,1993