1. Anderson: Computer Security Threat Monitoring and Surveillance. James P;James,1980
2. An intrusion-detection model;Denning;IEEE Trans. Software Eng.,1987
3. A sense of self for unix processes;Forrest;Proceedings IEEE symposium on security and privacy,1996
4. Artificial neural networks for misuse detection;Cannady;National information systems security conference,1998
5. Expert systems in intrusion detection: a case study;Sebring;Proceedings of the 11th National Computer Security Conference,1988