R. Agrawal, T. Imieli´nskiimieli´nski, and A. Swami, Mining association rules between sets of items in large databases, Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, pp.207-216

M. Hahsler, A Model-Based Frequency Constraint for Mining Associations from Transaction Data, Data Mining and Knowledge Discovery, vol.13, issue.2, pp.137-166, 2006.
DOI : 10.1007/s10618-005-0026-2

G. Hay, Extending the packet coded backdoor server to netcat relays on relatively high-bandwidth home networks, Tech. rep., SANS, 2001.

Y. Jonathan, Use port knocking to bypass firewall rules and keep security intact http://www.techrepublic.com/article/ use-port-knocking-to-bypass-firewall-rules-and-keep-security-intact, p.5798871, 2005.

J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, Fast portscan detection using sequential hypothesis testing, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004.
DOI : 10.1109/SECPRI.2004.1301325

Y. S. Koh and N. Rountree, Finding Sporadic Rules Using Apriori-Inverse, Lecture Notes in Computer Science, vol.3518, pp.97-106, 2005.
DOI : 10.1007/11430919_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.269.6823

Y. S. Koh and N. Rountree, Rare Association Rule Mining and Knowledge Discovery: Technologies for Infrequent and Critical Event Detection. Information Science Reference -Imprint of, 2009.
DOI : 10.4018/978-1-60566-754-6

B. Liu, W. Hsu, and Y. Ma, Mining association rules with multiple minimum supports, Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '99, pp.337-341, 1999.
DOI : 10.1145/312129.312274

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8948

M. Mahoney, M. V. Mahoney, and P. K. Chan, Learning rules for anomaly detection of hostile network traffic, Third IEEE International Conference on Data Mining, pp.601-604, 2003.
DOI : 10.1109/ICDM.2003.1250987

M. Marchetti, M. Colajanni, and F. Manganiello, Identification of correlated network intrusion alerts, 2011 Third International Workshop on Cyberspace Safety and Security (CSS), 2011.
DOI : 10.1109/CSS.2011.6058565

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.646.1574

S. Miklosovic, Pa018 -term project -port knocking enhancements, 2011.

S. E. Schechter, J. Jung, and A. W. Berger, Fast Detection of Scanning Worm Infections, Proceedings of the 7 th International Symposium on Recent Advances in Intrusion Detection (RAID, pp.59-81, 2004.
DOI : 10.1007/978-3-540-30143-1_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.6643

A. Valdes and K. Skinner, Adaptive, Model-Based Monitoring for Cyber Attack Detection, Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, pp.80-9200, 2000.
DOI : 10.1007/3-540-39945-3_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.7086

X. Wu, C. Zhang, and S. Zhang, Efficient mining of both positive and negative association rules, ACM Transactions on Information Systems, vol.22, issue.3, pp.381-405, 2004.
DOI : 10.1145/1010614.1010616

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.399.569