1. Heady, R., Luger, G., Maccabe, A. & Servilla, M. 1990. The architecture of a network level network intrusion detection system. Technical report CS90-20, Department of Computer Science, University of New Mexico.
2. Russel, D. & Gangemi, G.T. 1992. Computer security basics. CA: O=Reilly & Associates Inc. 448p.
3. Caelli, W., Dennis, L. & Shain, M. 1994. Information Security Handbook. First edition. Wilthire: Macmillan Press Ltd. 833p.
4. Anderson, J.P. 1980. Computer Threat Monitoring and Surveillance. (In Anderson, J.P. Technical report, Fort Washington, Pennsylvania.)
5. Sundaram, A. 1996. An introduction to intrusion detection. Crossroads: The ACM student magazine, 2(4), April.