C. Müller-schloer, Organic computing ? on the feasibility of controlled emergence, Conf. on Hardware/Software Codesign and System Synthesis, pp.2-5, 2004.

O. Buchtala, W. Grass, A. Hofmann, and B. Sick, A fusion-based intrusion detection architecture with organic behavior, The first CRIS Int. Workshop on Critical Information Infrastructures (CIIW), pp.47-56, 2005.

D. Fisch, A. Hofmann, V. Hornik, I. Dedinski, and B. Sick, A framework for largescale simulation of collaborative intrusion detection, IEEE Conf. on Soft Computing in Industrial Applications (SMCia/08), pp.125-130, 2008.

A. Hofmann and B. Sick, On-line intrusion alert aggregation with generative data stream modeling

S. Axelsson, Intrusion detection systems: A survey and taxonomy, 2000.

S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan, L. T. Heberlein et al., DIDS (distributed intrusion detection system) ? motivation, architecture, and an early prototype, Proc. of the 15th IEEE National Computer Security Conf, pp.167-176, 1992.

V. Yegneswaran, P. Barford, and S. Jha, Global intrusion detection in the domino overlay system, Proc. of the Network and Distributed System Security Symp., NDSS, 2004.

V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, and B. Maglaris, A distributed intrusion detection prototype using security agents, Proc. of the 6th Int. Conf., on Software Engineering, Artificial Intelligence, Networking and Parallel and Distributed Computing, pp.238-245, 2004.

Y. F. Zhang, Z. Y. Xiong, and X. Q. Wang, Distributed intrusion detection based on clustering, Proc. of 2005 Int. Conf. on Machine Learning and Cybernetics, pp.2379-2383, 2005.

J. E. Dickerson, J. Juslin, O. Koukousoula, and J. A. Dickerson, Fuzzy intrusion detection, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569), pp.1506-1510, 2001.
DOI : 10.1109/NAFIPS.2001.943772

J. Kim and P. Bentley, The artificial immune model for network intrusion detection, 7th European Conf. on Intelligent Techniques and Soft Computing (EUFIT'99), 1999.

G. Folino, C. Pizzuti, and G. Spezzano, GP Ensemble for Distributed Intrusion Detection Systems, Proc. of the 3rd Int. Conf. on Advances in Pattern Recognition, pp.54-62, 2005.
DOI : 10.1007/11551188_6

D. Fisch and B. Sick, Training of radial basis function classifiers with resilient propagation and variational Bayesian inference, 2009 International Joint Conference on Neural Networks, pp.838-847, 2009.
DOI : 10.1109/IJCNN.2009.5178699

C. M. Bishop, Pattern Recognition and Machine Learning, 2006.

R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall et al., Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.12-26, 2000.
DOI : 10.1109/DISCEX.2000.821506

J. Mchugh, Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4
DOI : 10.1145/382912.382923

M. Roesch, Snort ? lightweight intrusion detection for networks, LISA '99: Proc. of the 13th USENIX Conf. on System Administration, pp.229-238, 1999.