S. Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.1-7, 1999.
DOI : 10.1145/319709.319710

R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall et al., Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.12-26, 2000.
DOI : 10.1109/DISCEX.2000.821506

R. Lippmann, J. W. Haines, D. Fried, J. Korba, and K. Das, Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation, Proceedings of International Symposium on Recent Advances in Intrusion Detection, pp.162-182, 1907.
DOI : 10.1007/3-540-39945-3_11

S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. Chan, Cost-based modeling for fraud and intrusion detection: results from the JAM project, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.130-144, 2000.
DOI : 10.1109/DISCEX.2000.821515

J. E. Gaffney and J. W. Ulvila, Evaluation of intrusion detectors: a decision theory approach, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.50-61, 2001.
DOI : 10.1109/SECPRI.2001.924287

G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skoric, Measuring intrusion detection capability, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, 2006.
DOI : 10.1145/1128817.1128834

A. A. Cardenas, J. S. Baras, and K. Seamon, A framework for the evaluation of intrusion detection systems, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.63-77, 2006.
DOI : 10.1109/SP.2006.2

K. Nasr, A. Kalam, and C. Fraboul, An IDS Evaluation-Centric Taxonomy of Wireless Security Attacks, International Conference on Network Security & Applications (CNSA'11, pp.402-413, 2011.
DOI : 10.1016/S0167-4048(97)85785-9