1. State of the practice of intrusion detection technologies;Allen,2000
2. NIST special publication on intrusion detection systems;Bace,2001
3. Carver Jr CA, Hill JMD, Pooch UW. Limiting uncertainty in intrusion response. In: Second annual IEEE systems, man, and cybernetics information assurance and security workshop, West Point, New York; June 5–6, 2001.
4. Davey J. The CCTA risk analysis and management methodology (CRAMM). Current perspectives in healthcare computing; 1991. p. 360–5.
5. Intrusion detection FAQ: passive fingerprinting utilizing the telnet protocol negotiation data;Doyle,2003