1. H. Li and D. Liu, "Research on intelligent intrusion prevention system based on snort," in International Conference on Computer, Mechatronics, Control and Electronic Engineering, 2010, pp. 251-253.
2. P. Innella, "The evolution of intrusion detection systems," Tetrad Digital Integrity, pp. 1-15, 2001.
3. Z. Hicham, T. Ahmed, L. Rachid, and I. Noureddin, "Evaluating and comparison of intrusion in mobile ad hoc networks," International Journal of Distributed and Parallel Systems, vol. 3, p. 243, 2012.
4. S. Gunasekaran, "Comparison of network intrusion detection systems in cloud computing environment," in International Conference on Computer Communication and Informatics, 2012, pp. 1-6.
5. E. Albin and N. C. Rowe, "A realistic experimental comparison of the Suricata and Snort intrusion-detection systems," in 2012 26th International Conference on Advanced Information Networking and Applications Workshops, 2012, pp. 122-127.