Paper Recommendation
1985 Requirements and Model For Ides: A Real-time intrusion Detection System

1997 EMERALD: Event Monitoring Enabling Responses To Anomalous Live Disturbances

1990 A Network Security Monitor

1996 Classification and Detection of Computer intrusions

1987 An intrusion-Detection Model

1996 Decentralized Trust Management

1990 A Neural Network Approach Towards intrusion Detection

1999 Snort - Lightweight intrusion Detection For Networks

2001 The Power of Events: An introduction To Complex Event Processing in Distributed Enterprise Systems

1995 A Software Architecture To Support Misuse intrusion Detection

1992 A Neural Network Component For An intrusion Detection System

1988 Automated Audit Trail Analysis and intrusion Detection: A Survey

1990 The Architecture of A Network Level intrusion Detection System

2000 Intrusion Detection With Unlabeled Data Using Clustering

1997 Query By Image and Video Content: The QBIC System

1988 Expert Systems in intrusion Detection: A Case Study

1996 Cooperating Security Managers: A Peer-based intrusion Detection System

1991 Model-based intrusion Detection

1980 A New Method To Determine MOSFET Channel Length

1991 The SRI IDES Statistical Anomaly Detector