1. Identifying enterprise network vulnerabilities;Myerson;International Journal of Network Management,2002
2. Evolutionary design of intrusion detection programs;Abraham;International Journal of Network Security,2007
3. Detecting new forms of network intrusion using genetic programming;Lu;Computational Intelligence,2004
4. Data mining for intrusion detection: a critical review;Julisch,2002
5. A framework for constructing features and models for intrusion detection systems;Lee,2000