1. CSI/FBI Computer Crime and Security Survey. Computer Security Inst., San Francisco, CA; 2004. .
2. Network security bible;Cole,2005
3. Bivens A, Embrechts M, Palagiri C, Smith R, Szymanski B. Network-based intrusion detection using neural networks. In: Proc Artif Neural Netw Eng, vol. 12, St. Louis, MO; 2002. p. 527–35.
4. A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data;Eskin,2002
5. Ramadas M, Ostermann S, Tjaden B. Detecting anomalous network traffic with self-organizing maps. In: Proc recent adv intrusion detect (RAID), lecture notes in computer science, vol. 2820, Pittsburgh, PA; 2003. p. 36–54.