1. Agrawal R, Srikant R. Fast algorithms for mining association rules. In: Proceedings of the international conference on very large databases, 1994.
2. Allen J, Christie A, Fithen W, McHugh J, Pickel J, Stoner E. State of the practice of intrusion detection technologies. CMU/SEI-99-TR-028 Carnegie Mellon Software (http://www.sei.cmu.edu/pub/documents/99.reports/pdf/99tr028.pdf). Engineering Institute, 1999.
3. Balasubramaniyan JS, Fernandezm JOG, Isacoff D, Spafford E, Zamboni D. An architecture for intrusion detection using autonomous agents. In: Proceedings of the annual computer security applications conference, 1998. p. 13–24.
4. Bridges S, MS, Vaughn RB. Fuzzy data mining and genetic algorithms applied to intrusion detection. In: Proceedings of the national information systems security conference, 2000.