1. Detecting Intruders in Computer Systems;T. Lunt
2. Expert Systems in Intrusion Detection: A Case Study;M. Sebring,1988
3. T. Kohlenberg, (Ed.), Alder, Raven, Carter, Dr. Everett F. (Skip), Jr., Esler, Joel., Foster, James C., Jonkman Marty, Raffael, and Poor, Mike, "Snort IDS and IPS Toolkit," Syngress, 2007, ISBN 978-1-59749-099-3.
4. A Target-Centric Ontology for Intrusion Detection;J. Undercoffer,2003
5. Detecting Intrusion Using System Calls: Alternative Data Models;C. Warrender;IEEE Symposium on Security and Privacy,1999