1. Stallings W: Cryptography and Network Security Principles and Practices. Prentice Hall, Upper Saddle River; 2006.
2. Anderson J: An Introduction to Neural Networks. MIT, Cambridge; 1995.
3. Rhodes B, Mahaffey J, Cannady J: Multiple self-organizing maps for intrusion detection, Paper presented at the Proceedings of the 23rd National Information Systems Security Conference, Baltimore, 16–19. 2000.
4. Franklin S, Graser A: Is it an agent or just a program? In ECAI '96 Proceedings of the Workshop on Intelligent Agents III, Agent Theories, Architectures, and Languages. Springer, London; 1996.
5. Jaisankar N, Yogesh SGP, Kannan A, Anand K: Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection, Soft Computing Techniques in Vision Sci., SCI 395. Springer; 2012:147-153.