LINK  S. Axelsson, “The base-rate fallacy and the difficulty of intrusion detection,” ACM Trans. Inf. Syst. Secur.,vol. 3, no. 3, pp.186-205, 2000.
LINK  S. Axelsson, “Intrusion detection systems: A survey and taxonomy,” Technical Report 99-15, Chalmers Univ., March 2000.
LINK  CESNET, z. s. p. o. Family of COMBO Cards. http://www.liberouter.org/hardware.php, 2007.
LINK  Cisco Systems. Cisco IOS NetFlow. http://www.cisco.com/go/netflow, 2007.
LINK  Evan Cooke, Farnam Jahanian, and Danny Mcpherson, “The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets.” Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), pp.39-44, June 2005.
LINK  L. Ertoz, E. Eilertson, A. Lazarevic, P.-N. Tan, V. Kumar, J. Srivastava, and P. Dokas, “MINDS-Minnesota Intrusion Detection System.” Next Generation Data Mining, MIT Press, 2004.
LINK  A. Lakhina, M. Crovella, and C. Diot, “Characterization of Network-Wide Anomalies in Traffic Flows.” ACM SIGCOMM conference on Internet measurement IMC'04, pp.201-206, New York, NY, USA, ACM Press, 2004.
LINK A.Lakhina, M. Crovella, and C. Diot, “Diagnosis Network-Wide Traffic Anomalies.” ACM SIGCOMM'04, pp.219-230, New York, NY, USA, ACM Press, 2004.
LINK  A. Lakhina, M. Crovella, and C. Diot, “Mining Anomalies using Traffic Feature Distributions.” ACM SIGCOMM, Philadelphia, PA, August 2005, pp.217-228, NewYork, NY, USA, ACM Press, 2005.
LINK  M. Lesk, “The new front line: Estonia under cyberassault.” IEEE Security and Privacy, vol.5, no. 4, pp.76-79, 2007.
LINK  Gordon Lyon, Nmap. http://insecure.org/nmap/.
LINK  S. Marsh, Formalising trust as a computational concept, 1994.
LINK  S. Northcutt and J. Novak, Network Intrusion Detection: An Analyst's Handbook. Thousand Oaks, CA, USA, NewRiders Publishing, 2002.
LINK  M. Rehak, M. Pechoucek, K. Bartos, M. Grill, and P. Celeda, “Network intrusion detection by means of community of trusting agents.” IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2007 Main Conference Proceedings) (IAT'07), Los Alamitos, CA, USA, 2007. IEEE Computer Society.
LINK  M. Rehák, L. Foltýn, M. Pechoucek, and P. Benda. “Trust Model for Open Ubiquitous Agent Systems.” Intelligent Agent Technology, 2005 IEEE/WIC/ACM International Conference, number PR2416 in IEEE, 2005.
LINK  M. Rehak and M. Pechoucek. “Trust modeling with contextrepresentation and generalized identities.” Cooperative Information Agents XI, number 4676 in LNAI/LNCS. Springer-Verlag, 2007.
LINK  K. Scarfone and P. Mell, “Guide to intrusion detection and prevention systems (idps).” Technical Report 800-94,NIST, US Dept. of Commerce, 2007.
LINK  S. Sidiroglou and A. D. Keromytis. “Countering network wormsthrough automatic patch generation.” IEEE Security & Privacy, vol. 3, no. 6, pp.41-49, November/December 2005.
LINK  D. Šišlák, M. Rehák, M. Pechoucek, M. Rollo, and D. Pavlícek, “A-globe: Agent development platform with inaccessibility and mobility support.” Software Agent-Based Applications, Platforms and Development Kits, pp.21-46, Berlin, Birkhauser Verlag, 2005.
LINK  Sourcefire, Inc. SNORT—Intrusion Prevention System. http://www.snort.org/,2007.
LINK  J. Tozicka, M. Rovatsos, and M. Pechoucek, “A framework for agent-based distributed machine learning and data mining.” Autonomous Agents and Multi-Agent Systems (AAMAS 2007), pp.666-673, New York, NY, ACM Press, 2007.
LINK  K. Xu, Z.-L. Zhang, and S. Bhattacharrya, “Reducing Unwanted Traffic in a Backbone Network.” USENIX Workshop on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), Boston, MA, July 2005.