[1] Shelly Xiaonan Wu, Wolfgang Banzhaf. The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing, 2010, 10 : 1–35.
[2] P. Garcı´a-Teodoro, J. Dı´az-Verdejo, G. Macia´-Ferna´ndez, E. Va´zquez. Anomaly-based network intrusion detection:Techniques, systems and challenges. Computers & Security, 2009, 28: 18–28.
[3] Chih-Fong Tsai, Yu-Feng Hsu, Chia-Ying Lin, Wei-Yang Lin. Intrusion detection by machine learning: A review. Expert Systems with Applications, 2009, 36: 11994–12000.
[4] Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson Thomasa. Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications, 2007, 30: 114–132.
[5] Han-Ching Wu, Shou-Hsuan Stephen Huang. Neural networks-based detection of stepping-stone intrusion. Expert Systems with Applications, 2010, 37: 1431–1437.
[6] 李晓芳, 姚远. 入侵检测工具Snort的研究与使用. 计算机应用与软件, 2006, 23(3): 123–125.