(2) R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman : “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation”, Proc. of the DARPA Information Survivability Conference & Exposition, Vol. II, No. II (1998)
(3) W. Lee, S. J. Stolfo, and K. W. Mok : “A Data Mining Framework for Building Intrusion Detection Models”, IEEE Symp. Security & Privacy (1999)
(4) J. B. D. Cabrera, B. Ravichandran, and R. K. Mehra : “Statistical Traffic Modeling for Network Intrusion Detection”, 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (2000)