1. What do you feed a trojan horse?;Stoll,1987
2. Computer Security Threat Monitoring and Surveillance;Anderson,1980
3. Analysis of Computer System Audit Trails—Final Report;van Horne,1986
4. A prototype real-time intrusion-detection system;Lunt,1988
5. Development and Application of IDES: A Real-Time Intrusion-Detection Expert System;Lunt,1988