E. , E. Lee, W. Stolfo, and S. , Modeling system calls for intrusion detection with dynamic window sizes, DARPA Information Survivability Conference and Exposition II (DISCEX II), pp.165-175, 2001.

N. Ye, A markov chain model of temporal behavior for anomaly detection, IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, pp.171-174, 2000.

T. Lane and C. Brodley, Sequence matching and learning in Anomaly Detection for computer security, The Fourth National Conference on Artificial Intelligence, pp.43-49, 1997.

C. Warrender, S. Forrest, and B. Pearlmutter, Detecting intrusions using system calls: alternative data models, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.133-145, 1999.
DOI : 10.1109/SECPRI.1999.766910

H. Javitz and A. Valdes, The NIDES statistical component: description and justification, 1993.

E. Knorr and R. Ng, Algorithms for mining distance-based outliers in large data sets, 24th Int. Conf. Very Large Data Bases, VLDB, Technique et Science Informatiques, pp.392-403, 1998.

E. Knorr and R. Ng, Finding international knowledge of distance-based outliers, The VLDB Journal, pp.211-222, 1999.

V. Breunig, H. Kriegel, R. Ng, and J. Sander, LOF: identifying density-based local outliers, ACM SIGMOD Int. Conf. on Management of data, pp.93-104, 2000.

L. Portnoy, E. Eskin, and S. Stolfo, Intrusion detection with unlabeled data using clustering, ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), 2001.

U. Galassi, A. Giordana, L. Saitta, and M. Botta, Learning Profiles Based on Hirarcical Hidden Markov Model, ISMIS 2005, LNAI 3488, pp.47-55, 2005.

H. Link, T. Lane, and J. Magliano, Models and Model Biases for Automatically Learning Task Switching Behavior, Proceedings of the 2005 HCI International (HCII) Conference on Augmented Cognition. HCI International (HCII) 2005

W. Lee and S. Stolfo, Data mining approaches for intrusion detection, USENIX Security Symposium, 1998.

S. Greenberg, Using Unix: collected traces of 168 users includes tar-format cartridge tape, Research Report, vol.8833345, 1998.