S. Axelsson, Intrusion Detection Systems: A Survey and Taxonomy, 2000.

S. Gruner and B. Watson, Model-based passive testing of safetycritical components, in Model-Based Testing for Embedded Systems, pp.453-483, 2011.

R. Harang and P. Guarino, Clustering of Snort alerts to identify patterns and reduce analyst workload, MILCOM 2012, 2012 IEEE Military Communications Conference, 2012.
DOI : 10.1109/MILCOM.2012.6415777

T. Lunt, A survey of intrusion detection techniques, Computers & Security, vol.12, issue.4, pp.405-418, 1993.
DOI : 10.1016/0167-4048(93)90029-5

A. Memon, Log File Categorization and Anomaly Analysis Using Grammar Inference, 2008.

P. Ning and S. Jajodia, Intrusion detection techniques, in The Internet Encyclopedia, pp.355-367, 2004.

M. Olivier and E. Gudes, Wrappers ??? A Mechanism to Support State-Based Authorization in Web Applications, Data and Knowledge Engineering, vol.43, issue.3, pp.281-292, 2002.
DOI : 10.1007/0-306-47008-X_14

T. Parr, The Definitive ANTLR Reference: Building Domain- Specific Languages, Pragmatic Bookshelf, 2007.

A. Valdez and K. Skinner, Probabilistic Alert Correlation, Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection, pp.54-68, 2001.
DOI : 10.1007/3-540-45474-8_4

S. Zhang, T. Dean, and S. Knight, A lightweight approach to statebased security testing, Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research, 2006.
DOI : 10.1145/1188966.1189004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.995