1. Roesch M et al. Snort: lightweight intrusion detection for networks In LISA 229 238
2. Murphy KP Naive bayes classifiers 2006
3. Deng PS Wang JH Shieh WG Yen CP Tung CT Intelligent automatic malicious code signatures extraction InProceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology 2003 600 603
4. Wang C Sun L Wei J Mo X A new trojan horse detection method based on negative selection algorithm In Proceedings of 2012 IEEE International Conference on Oxide Materials for Electronic Engineering (OMEE) 2012 367 369
5. Fiskiran AM Lee RB Runtime execution monitoring (rem) to detect and prevent malicious code execution In Proceedings of IEEE International Conference on Computer Design: VLSI in Computers and Processors (ICCD) 2004 452 457