References
- Network and Internetwork Security William Stalling
- Crossroads ACM An introduction to intrusion detection Aurobindo Sundaram
- IEEE Trans. S. E. An intrsion detection model Dorothy E. Denning
- Proc. of IEEE Computer Society Symposium in Security and Privacy USTAT: A real-time inerustion detection system for UNIX K. Ilgun
- Proc. of the 11th National Conference on Artificial Intelligence Applications Security audit trail analysis using inductively generated predictive rules Henry S. Teng;Kaihu Chen;Stephen C. Lu
- Computers and Security A survey of intrustion detection techniques Teresa F. Lunt
- Proc. of IEEE Computer Society Symposium Research in Security and Privacy A neural network component for an intrusion system H. Debra(et al.)
- Proc. of the 14th National Computer Security Conference Model-based intrusion detection Tomas D. Garvey;Teresa F. Lunt
- Detecting Unusual Program Behavior Using the NIDES Statistical Component Teresa F;Lunt and Debra Anderson
- Fuzzy sets, uncertainty, and information George J. Klir;Tina A. Folger
- The Fuzzy Systems Handbook Lotfi Zadeh
- Proc. of 13th NCSC A UNIX prototype for intrusion and anomaly detection in secure networks J. R. Winkler
- Computers under Attack Peter J. Denning