S. Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, 1999.
DOI : 10.1145/319709.319710

G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skori´cskori´c, Measuring intrusion detection capability, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, 2006.
DOI : 10.1145/1128817.1128834

K. T. Kearney, F. Torelli, and C. Kotsokalis, SLA★: An abstract syntax for Service Level Agreements, 2010 11th IEEE/ACM International Conference on Grid Computing, 2010.
DOI : 10.1109/GRID.2010.5697973

F. Massicotte, F. Gagnon, Y. Labiche, L. Briand, and M. Couture, Automatic Evaluation of Intrusion Detection Systems, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006.
DOI : 10.1109/ACSAC.2006.15

T. Probst, E. Alata, M. Kaâniche, and V. Nicomette, Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds, 2015 11th European Dependable Computing Conference (EDCC), 2015.
DOI : 10.1109/EDCC.2015.10

URL : https://hal.archives-ouvertes.fr/hal-01212064

D. Riquet, G. Grimaud, and M. Hauspie, Discus: A massively distributed IDS architecture using a DSL-based configuration, 2014 International Conference on Information Science, Electronics and Electrical Engineering, 2014.
DOI : 10.1109/InfoSEEE.2014.6947859

URL : https://hal.archives-ouvertes.fr/hal-00996876