Winkler, "A Unix Prototype for Intrusion and Anomaly Detection in Secure Networks", Proceedings of 13th National Computer Security Conference, pp. 1-10, Oct. 1990. |
Mukherjee et al., "Network Intrusion Detection", IEEE, pp. 26-41, Jun. 1994. |
Winkler et al., Intrusion and Anomaly Detection in Trusted Systems, IEEE, pp. 39-45, Dec. 1989. |
Nemeth et al., UNIX System Administration Handbook, 2nd Ed., Prentice Hall PTR, pp. 539-560, Dec. 1995. |
Russell et al., Computer Security Basics, O'Reilly & Associates, Inc., pp. 11-13, Dec. 1991. |
Bartee, Data Communications, Networks, and Systems, pp. 313-315, Dec. 1991. |
Farmer et al., "The COPS Security Checker System" Purdue University Technical Report CSD-TR-993, Sep. 1991. |
Farmer et al., "SATAN--Adminstrator Tool for Analyzing Networks", HTML documentation files, http://www.cerf.net/security/satan/docs/, Dec. 1995. |