1. Alok Sharma, Arun K. Pujari, and Kuldip K. Paliwal. 2007. Intrusion detection using text processing techniques with a kernel based similarity measure. Comput. Secur. 26, 7-8 (December 2007), 488--495.
2. Yihua Liao and V. Rao Vemuri. 2002. Using Text Categorization Techniques for Intrusion Detection. In Proceedings of the 11th USENIX Security Symposium, Dan Boneh (Ed.). USENIX Association, Berkeley, CA, USA, 51--59.
3. Sanjay Rawat, Arun K. Pujari, and V. P. Gulati. 2006. On the Use of Singular Value Decomposition for a Fast Intrusion Detection System. Electron. Notes Theor. Comput. Sci. 142 (January 2006), 215--228.
4. Sang Hyun Oh and Won Suk Lee. 2003. Refereed papers: An anomaly intrusion detection method by clustering normal user behavior. Comput. Secur. 22, 7 (October 2003), 596--612.
5. Sang Hyun Oh and Won Suk Lee. 2003. Refereed papers: An anomaly intrusion detection method by clustering normal user behavior. Comput. Secur. 22, 7 (October 2003), 596--612.