1. Ran Zhang, Depei Qian, and Wenjie Zhang, Overview of intrusion detection technology, Small & Micro Computer System, vol. 24, p.1113–1118, July (2003).
2. Lixia Zhang, and Li Chen, An improved Pattern Matching Algorithm, MicroComputer Information, vol. 24, p.68–70, October (2008).
3. Shujuan Sun, and Yujing Wang, Research of Pattern Matching Algorithm for Intrusion Detection, Science Technology Information Development and Economy, vol. 17, p.207–208, July (2008).
4. Kumar G. Classification and detection of computer intrusion. Purdue University, (1995).
5. Danvy O, and Rohde H, On obtaining the Boyer-Moore string-matching algorithm by partial evaluation, Information Processing Letters, vol. 99, pp.158-162, April (2006).