1. Anderson, J.P., 1980. Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company, Fort Washington, PA, April 1980
2. The base-rate fallacy and the difficulty of intrusion detection;Axelsson;ACM Trans. Inform. System Security,2000
3. Axelsson, S., 2000b. Intrusion detection systems: A survey and taxonomy. Technical Report 99-15, Chalmers University, March
4. Cannady, J., 1998. Artificial neural networks for misuse detection. In: Proc. 1998 National Information Systems Security Conf. (NISSC’98) October 5–8, 1998. Arlington, VA, pp. 443–456
5. Cannady, J., 2000. Next generation intrusion detection: Autonomous reinforcement learning of network attacks. In: Proc. 23rd National Information Systems Security Conf., NISSC 2000