References
1. Salim R. and Rao Radha Krishna G. S. V., “Design and Development of Network Intrusion Detection System Detection Scheme on Network Processing Unit”, 2006, ISBN 89-5519-129-4.,.
2. Najeeb A. A., “Development and Implementation of Network Security Manager” 2007, M.Sc. Thesis ,University of Sulaimani,
3. Zhong C.and Chen Guo-Liang, “A fast determinate string matching algorithm for the network intrusion detection systems”, 2007,1-4244-0973-X, IEEE,
4. Blustein James, Fu Ching-Lung and Silver Daniel L. “ Information visualization for and Intrusion detection System”, ACM:, 2005.
5. Salim Robin and Rao Radha Krishna G. S. V., “Software-Based packet Classification in Network Intrusion Detection System using network Processor”, IEEE, 2006.
6. Wang Y., Huang G. X. and Peng D. G., ”Model of Network Intrusion Detection System based on BP Algorithm”, IEEE, 2006.
7. Bolzoni Damino, Etalle Sando, Hartel Pieter “POSEIDON:a 2-tier Anomaly-Based Network Intrusion Detection System”, proceeding of the forth IEEE international on information assurance, 2006.
8. Sekar R. guang Y. Verma S. and Shanbhag T., “A High Performance Network Intrusion Detection System”, ACM, 1999

