@article{yuill_wu_settle_gong_forno_huang_asbery_2000, title={Intrusion-detection for incident-response, using a military battlefield-intelligence process}, volume={34}, number={4}, journal={Computer Networks (Amsterdam, Netherlands : 1999)}, author={Yuill, J. and Wu, F. and Settle, J. and Gong, F. and Forno, R. and Huang, M. and Asbery, J.}, year={2000}, pages={671–697} } @inbook{chang_narayan_saryor_jou_wu_vetter_gong_wang_brown_yuill, title={DecIdUouS: decentralized source identification for network-based intrusions}, booktitle={Integrated network management VI: Distributed management for the networked millennium}, publisher={Piscataway, NJ: IEEE Pub.}, author={Chang, H. Y. and Narayan, R. and Saryor, C. and Jou, P. and Wu, S. F. and Vetter, B. M. and Gong, F. and Wang, X. and Brown, M. and Yuill, J. J.}, editor={M. Sloman, S. Mazumdar and Lupu, E.Editors}, pages={701–714} }