1. Practical automated detection of stealthy portScans;Staniford;IDS Workshop of the Seventh Computer and Communications Security Conference, Athens, Greece,2000
2. PHAD: packet header anomaly detection for identifying hostile network traffic;Mahoney;Florida Institute of Technology Technical Report CS-2001-4,2004
3. Learning nonstationary models of normal network traffic for detecting novel attacks;Mahoney;Proceedings of the Eighth International Conference on Knowledge Discovery and Data Mining,2002
4. Intrusion detection: a brief history and overview;Kemmerer;IEEE Computer,2002
5. An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection;Mahoney;Florida Institute of Technology Technical Report CS-2003-02,2003