МАЦІЇ в телекомунікаційніх системах. ISINAS - 2000. Праці. - СПб., 2000. p> 2. J. Allen, A. Christie, W. Fithen, J. McHuge, J. Pickel, E. Stoner, State of Practice of intrusion detection technologies// Technical Report CMU/SEI-99-TR-028. Carnegie Mellon Software Engineering Institute. 2000,
3. D. Denning, An Intrusion Detection Model. // IEEE Transactions on Software Engineering, v. SE-13, № I, 1987, pp. 222-232,
4. R. Heady, G. Luger, A. Maccabe, M. Servilla. The Architecture of a Network Level Intrusion Detection System. // Technical report, Department of computer since, University of New Mexico, August 1990.
5. D. Anderson et al. Next Generation Intrusion Detection Expert System (NIDES). // Software Design, Product Specification and Version Description Document, Project 3131, SRI International, July 11, 1994. p> 6. С.А. Терехов. Байесови мережі// Наукова сесія МІФІ - 2003, V Всеросійської науково - технічна конференція В«Нейроінформатіка-2003В»: Лекції з нейроінформатіке. Частина 1.-М.: МІФІ, 2003.-188с
7. H. Debar, M. Becker, D. Siboni. A neural network component for intrusion detection systems// In proceeding of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pages 240 - 250, Oakland, CA, USA, May 1992. p> 8. K. Cheng. An Inductive engine for the Acquisition of temporal knowledge. // Ph. D. Thesis, Department of computer science, university of Illinois at Urbana-Champain 1988.
9. P. A. Porras, P.G. Neumann, EMERLAND: Event Monitoring Enabling Response to Anomalous Live Disturbance// Proceeding of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1997.
10. K. Ilgun, R.A. Kemmerer, P.A. Porras, State Transition Analysis: A Rule-Based Intrusion Detection System// IEEE Trans. Software Eng. vol. 21, no. 3, Mar. 1995. p> 11. K. Ilgun, USTAT: A Real-time Intrusion Detection System for UNIX// Proceeding of the IEEE Symposium on Research in Security and Privacy.
12. T. Heberlein, G Dias, K. Levitt, B. Mukherjee, J. Wood. A network security monitor. // In Proceeding of the 1990 IEEE Symposium on Research in Security and Privacy, pages 296 - 304.
13. T.D. Garvey, T.F. Lunt, Model-based Intrusion Detection// Proceeding of the 14 th Nation computer security conference, Baltimore, MD, October 1991. p> 14. J.P. Anderson, Computer Security Threat Monitoring and Surveillance// James P. Anderson Co., Fort Washington, PA, April. 1980. p> 15. Sandeep Kumar, Eugene H. Spafford. An application of pattern matching in intrusion detection// Technical Report CSD-TR-94-013, The COAST Project, Dept. Of Computer Sciences, Purdue University, West Lafayette, IN, USA, 17 june 1994. p> 16. Vern Paxon. Bro: A system for detection network intruders in real time// Proceeding of the 7 th USENIX Security Symposium, San Antonio, TX, USA, January 1998. br/>