James Joseph Yuill Yuill, J., Wu, F., Settle, J., Gong, F., Forno, R., Huang, M., & Asbery, J. (2000). Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks (Amsterdam, Netherlands : 1999), 34(4), 671–697. Chang, H. Y., Narayan, R., Saryor, C., Jou, P., Wu, S. F., Vetter, B. M., … Yuill, J. J. DecIdUouS: decentralized source identification for network-based intrusions. In S. M. M. Sloman & E. Lupu (Eds.), Integrated network management VI: Distributed management for the networked millennium (pp. 701–714). Piscataway, NJ: IEEE Pub.