1Somayaji, A., Hofmeyr, S. and Forrest, S.,1997,Principles of a Computer Immune System, In Proceeding of New Security Paradigms Workshop, Langdale,Cumbria, Pages 75-82.
2Richard A. Kemmerer, NSTAT: A Model-based Realtime Network Intrusion Detection System, Tech. Report TRCS97-18, University of California, Santa Barbara, 1997.
3Allen, et.al.," State of the Practice of Intrusion Detection Technologies", Technical Report, CMU/SEI-99-TR-028, ESC-99-028, January 2000.
4Lindqvist, Ulf, On the Fundamentals of Analysis and Detection of Computer Misuse, PhD dissertation, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, 1999.
5Schuba, Christoph, Ivan V. Krsul, and Markus G.Kuhn, Analysis of a Denial of Service Attack on TCP,COAST Laboratory, CS Dept. Purdue University, 1997.