1. D. Denning, “An Intrusion-Detection Model,” Proc. 1986 EEE Symp. Sec. Privacy, Apr. 7-9, 1986, pp. 118-31.
2. D.S. Kim and J.S. Park, “Network-Based Intrusion Detection with Support Vector Machines,” Proc. Information etworking, Network-ing Technologies for Enhanced Internet Services Int’l Conf. (ICOIN’03),pp. 747-756, 20.
3. L. Portnoy, E. Eskin, and S. Stolfo, “Intrusion Detection with Unlabeled Data Using Clustering,” Proc. ACM Workshop Data Mining Applied to Security (DMSA), 2001.
4. T. Abraham, IDDM: Intrusion Detection Using Data Mining Techniques, http://www.dsto.defence./gov.au/publications/2345/DSTO-GD-0286.pdf, 2008.
5. R. Agrawal, T. Imielinski, and A. Swami, “Mining Association Rules between Sets of Items in Large Databases,” Proc. ACM SIGMOD, vol. 22, no. 2, pp. 207-216, 1993.