1. J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, E. Stoner, State of the practice of intrusion detection technologies, Carnegie Mellon University/Software Engineering Institute Technical Report CMU/SEI-99-TR-028, January 2000
2. E.G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion.Net Books, 1999
3. Cisco Systems Inc., NetRanger Intrusion Detection System Technical Overview, 1998, http://www.cisco.com/warp/public/778/security/netranger/ntran_tc.htm
4. T. Heberlein, Network security monitor (NSM) – Final Report, U.C. Davis, February 1995, http://seclab.cs.ucdavis.edu/papers/NSM-final.pdf
5. Lawrence Livermore National Laboratory, Network Intrusion Detector (NID) Overview, Computer Security Technology Center, 1998, http://ciac.llnl.gov/cstc/nid/intro.html