1. Detecting unusual program behavior using the stastistical component of the next-generation intrusion detection expert system (NIDES);Anderson,1995
2. Neural networks for pattern recognition;Bishop,1995
3. Artificial neural networks for misuse detection;Cannady,1998
4. Learning rules and clusters for anomaly detection in network traffic;Chan,2004
5. Defending a computer system using autonomous agents;Crosbie,1995