T. O. Database, , 2008.

T. Escamilla, Intrusion Detection : Network Security beyond the firewall, 1998.

O. Goldreich, Secure multi-party computation -working draft, 2000.

R. Graham, FAQ : Network intryusion detection system, 2001.

R. Heady, G. Luger, A. Maccabe, and M. Servilla, The architecture of a network level intrusion detection system, 1990.

J. Hopcroft, R. Motwanu, E. J. Rotwani, and . Ullman, Introduction to Automata Theory, Languages and Computability, 2000.

R. Janakiraman, M. Waldvoge, and Q. Zhang, Indra : a peer-to-peer approach to network intrusion detection and prevention, Proc. of the 12th IEEE International Workshops on Enabling Technologies : Infrastructure for Collaborative Enterprises, pp.226-231, 2003.

M. Kantarcioglu and J. Vaidya, An architecture for privacy-preserving mining of client information, Proc. of the Workshop on Privacy, Security, and Data Mining in conjunction with the 2002 IEEE ICDM Conf, pp.27-42, 2002.

M. Locasto, J. Parekh, A. Keromytis, and E. S. Stolfo, Towards collaborative security and p2p intrusion detection, Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, 2005.

J. Mchugh, A. Christie, and J. Allen, Defending yourself : the role of intrusion detection systems, IEEE Software, pp.42-51, 2000.

P. Proctor, Practical Intrusion Detection Handbook, 2001.

K. Wang, G. Cretu, and E. S. Stolfo, Anomalous payload-based worm detection and signature generation, Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection, 2005.

G. Zhang and M. Parashar, Journal of Research and Practice in Information Technology, vol.38, 2006.

C. V. Zhou, S. Karunasekera, and C. Leckie, Evaluation of a decentralized architecture for large scale collaborative intrusion detection, Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management (IM 2007), pp.80-89, 2007.