1. Burton, R., & Brown, J. (1982) An investigation of computer coaching for informal learning activities. In D. Sleeman and J. Brown (Eds), Intelligent Tutoring Systems, London: Academic Press, 79–98
2. Farrow, R. (1991) Unix System Security. Reading, MA: Addison-Wesley
3. Johnson, W., (1987) Developing expert system knowledge bases in technical training environments. In Intelligent Tutoring Systems: Lessons Learned, pp. 21–33. New York: Lawrence Erlbaum
4. Kumar, S., & Spafford, E. (1994) A pattern-matching model for misuse intrusion detection. Seventeenth National Computer Security Conference, Baltimore, MD, October, 11–21
5. A survey of intrusion-detection techniques;Lunt;Computers and Security,1993