Anderson, D., T. Fribold, and A. Valdes (1995). Next Generation Intrusion Detection Expert System (NIDES): A Summary, SRI-CSL-95-07. Menlo Park, CA: SRI International.
Anderson, D., T. F. Lunt, H. Javitz, A. Tamaru, and A. Valdes (1995). Detecting Unusual Program Behavior Using the Statistical Component of the Next Generation Intrusion Detection Expert System (NIDES), SRI-CSL-95-06. Menlo Park, CA: SRI International.
Forrest, S., A.S. Perelson, L. Allen, and R. Cherukuri (1994). "Self-nonself discrimination in a computer," in Proc. 1994 IEEE Symposium on Research in Security and Privacy.
Hundley, R., and R. Anderson (1995). "Emerging Challenge: Security and Safety in Cyberspace," IEEE Technology and Society Magazine, Vol. 14, No. 4, Winter 1995-1996, pp. 19-28. Reprinted in RAND RP-484.
Kephart, J. O. (1994). "A Biologically Inspired Immune System for Computers," in R. A. Brooks and P. Maes (eds.), Artificial Life IV, Proceedings of the Fourth International Workshop on Synthesis and Simulation of Living Systems, Cambridge, MA: MIT Press, pp. 130-139.
Mesic, R., R. Molander, and P. Wilson (1995). Strategic Futures: Evolving Missions for Traditional Strategic Delivery Vehicles, RAND, MR-375-DAG.
Molander, R., A. Riddile, and P. Wilson (1996). Strategic Information Warfare: A New Face of War, RAND, MR-661-OSD.
Molander, R., P. Wilson, R. Mesic, and S. Gardiner (1994). Under the Nuclear Shadow: Power Projection in the Post-Cold War World, RAND, MR-513-AF.
Venema, W. (1992). "TCP Wrapper: Network Monitoring, Access Control, and Booby Traps," in Proceedings of the 3rd Unix Security Symposium, Baltimore, MD, September 1992.