@article{garofalakis2002ndm,
  title={{Network Data Mining and Analysis: The NEMESIS Project}},
  author={Garofalakis, M. and Rastogi, R.},
  journal={LECTURE NOTES IN COMPUTER SCIENCE},
  pages={1--12},
  year={2002},
  publisher={Springer}
}

@techreport{fraleigh:apm,
  title={{Architecture of a Passive Monitoring System for Backbone IP Networks}},
  author={Fraleigh, C. and Moon, S. and Diot, C. and Lyles, B. and Tobagi, F.},
  institution={Technical Report TR00-ATL-101-801, Sprint Advanced Technology Laboratories, October 2000}
}

@conference{buchsbaum2000ecm,
  title={{Engineering the compression of massive tables: an experimental approach}},
  author={Buchsbaum, A.L. and Caldwell, D.F. and Church, K.W. and Fowler, G.S. and Muthukrishnan, S.},
  booktitle={Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms},
  pages={175--184},
  year={2000},
  organization={Society for Industrial and Applied Mathematics Philadelphia, PA, USA}
}

@article{auld2007bnn,
  title={{Bayesian Neural Networks for Internet Traffic Classification}},
  author={Auld, T. and Moore, A.W. and Gull, S.F.},
  journal={IEEE TRANSACTIONS ON NEURAL NETWORKS},
  volume={18},
  number={1},
  pages={223},
  year={2007},
  publisher={IEEE INSTITUTE OF ELECTRICAL AND ELECTRONICS}
}

@article{shyu2007nid,
  title={{Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems}},
  author={Shyu, M.L. and Quirino, T. and Xie, Z. and Chen, S.C. and Chang, L.},
  year={2007},
  publisher={ACM Press New York, NY, USA}
}

@conference{xie2006dab,
  title={{A Distributed Agent-Based Approach to Intrusion Detection Using the Lightweight PCC Anomaly Detection Classifier}},
  author={Xie, Z. and Quirino, T. and Shyu, M.L. and Chen, S.C. and Chang, L.W.},
  booktitle={Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing-Vol 1 (SUTC'06)-Volume 01},
  pages={446--453},
  year={2006},
  organization={IEEE Computer Society Washington, DC, USA}
}

@article{zhang2007rfb,
  title={{Random forest-based network intrusion detection systems}},
  author={Zhang, J. and Zulkernine, M. and Haque, A.},
  journal={IEEE Transactions on Systems, Man, and Cybernetics, to appear in},
  year={2007}
}

@article{teoh2004dfa,
  title={{Detecting Flaws and Intruders with Visual Data Analysis}},
  author={Teoh, S.T. and Ma, K.L. and Wu, S.F. and Jankun-Kelly, TJ},
  journal={IEEE COMPUTER GRAPHICS AND APPLICATIONS},
  pages={27--35},
  year={2004},
  publisher={IEEE Computer Society}
}

@article{boukerche2008nam,
  title={{A Novel Algorithm for Mining Association Rules in Wireless Ad Hoc Sensor Networks}},
  author={Boukerche, A. and Samarah, S.},
  journal={Parallel and Distributed Systems, IEEE Transactions on},
  volume={19},
  number={7},
  pages={865--877},
  year={2008}
}

@conference{halatchev2005emv,
  title={{Estimating Missing Values in Related Sensor Data Streams}},
  author={Halatchev, M. and Gruenwald, L.},
  booktitle={Proceedings of 17th International Conference on Management of Data: Advances in Data Management (COMAD 2005), Computer Society of India},
  pages={83--94},
  year={2005}
}

@book{anderson1995ngi,
  title={{Next-generation Intrusion Detection Expert System (NIDES): A Summary}},
  author={Anderson, D. and Frivold, T. and Valdes, A.},
  year={1995},
  publisher={SRI International, Computer Science Laboratory}
}
@conference{lazarevic2003csa,
  title={{A comparative study of anomaly detection schemes in network intrusion detection}},
  author={Lazarevic, A. and Ertoz, L. and Kumar, V. and Ozgur, A. and Srivastava, J.},
  booktitle={Proceedings of the Third SIAM International Conference on Data Mining},
  year={2003},
  organization={Society for Industrial \& Applied}
}
@conference{labib2004dav,
  title={{Detecting and Visualizing Denial-of-Service and Network Probe Attacks Using Principal Component Analysis}},
  author={Labib, K. and Vemuri, V.R.},
  booktitle={Third Conference on Security and Network Architectures, La Londe, France},
  year={2004}
}
@article{verwoerd2002idt,
  title={{Intrusion detection techniques and approaches}},
  author={Verwoerd, T. and Hunt, R.},
  journal={Computer Communications},
  volume={25},
  number={15},
  pages={1356--1365},
  year={2002},
  publisher={Elsevier}
}
@article{zhang:idw,
  title={{Intrusion Detection in Wireless Ad-Hoc Networks}},
  author={Zhang, Y.}
}
@conference{phung2007rao,
  title={{Resource-aware Online Data Mining in Wireless Sensor Networks}},
  author={Phung, N.D. and Gaber, M.M. and Rohm, U.},
  booktitle={Computational Intelligence and Data Mining, 2007. CIDM 2007. IEEE Symposium on},
  pages={139--146},
  year={2007}
}

@article{moore2005itc,
  title={{Internet traffic classification using bayesian analysis techniques}},
  author={Moore, A.W. and Zuev, D.},
  journal={ACM SIGMETRICS Performance Evaluation Review},
  volume={33},
  number={1},
  pages={50--60},
  year={2005},
  publisher={ACM New York, NY, USA}
}

@article{moore2005duf,
  title={{Discriminators for use in flow-based classification}},
  author={Moore, A. and Zuev, D. and Crogan, M.},
  journal={Cambridge, Intel Research},
  year={2005}
}

@misc{moore_website,
    url={http://www.cl.cam.ac.uk/research/srg/netos/nprobe/data/papers/sigmetrics/index.html}
}

@misc{doxygen,
    url={http://www.stack.nl/~dimitri/doxygen/}
}

@misc{automake,
    url={http://www.gnu.org/software/automake/}
}
