1. S. Axelsson, “Intrusion Detection Systems: A Survey and Taxonomy”, http://citeseer.nj.nec.com/axelsson00intrusion.html, 2000.
2. V. N. P. Dao and V. R. Vemuri, “Computer Network Intrusion Detection: A Comparison of Neural Networks Methods”, Differential Equations and Dynamical Systems, (Special Issue on Neural Networks, Part-2), vol.10, No. 1&2, 2002.
3. S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Logstaff, “A Sense of Self for Unix process”, Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 120–128, 1996.
4. S. Forrest, S. A. Hofmeyr and A. Somayaji, “Computer Immunology”, Communications of the ACM, Vol. 40, 88–96, 1997.
5. W. Lee, S. J. Stolfo and P. K. Chan, “Learning Patterns from Unix Process Execution Traces for Intrusion Detection”, Proceedings of AAAI97 Workshop on AI Methods in Fraud and Risk Management, 50–56, 1997.