1. A method for fuzzy rules extraction directly from numerical data and its application to pattern classification;Abe;IEEE Transactions on Fuzzy Systems,1995
2. Allen J, Christie A, Fithen W, McHugh J, Pickel J, Stoner E. State of the practice of intrusion detection technologies. Technical report CMU/SEI99-TR-028, ESC-99-028, Carnegie Mellon, Software Engineering Institute, Pittsburgh, Pennsylvania; 1999.
3. Amoroso E. Intrusion detection. Intrusion.net Books, January 1999.
4. Detecting unusual program behavior using the stastistical component of the next-generation intrusion detection expert system (NIDES). SRI-CSL-95-06;Anderson,1995
5. Axelsson S. Intrusion detection systems: a survey and taxonomy. Technical report no. 99-15, Department of Computer Engineering, Chalmers University of Technology, Sweden. March 2000.