A. Curtis and . Carver-jr, Intrusion Response Systems: A Survey, pp.77843-3112

J. Yoo, A Call for Drastic Action, A Survey of Web Application Firewalls

M. Bishop, A taxonomy of Unix and network security vulnerabilities, 1995.

R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation, pp.2173-9108
DOI : 10.1007/3-540-39945-3_11

U. Lindqvist and E. Jonsson, How to systematically classify computer security intrusions, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1996.
DOI : 10.1109/SECPRI.1997.601330

S. Hansman and R. Hunt, A taxonomy of network and computer attacks, Computers & Security, vol.24, issue.1
DOI : 10.1016/j.cose.2004.06.011

E. Mohammed and . Gadelrab, Evaluation des Systèmes de Détection

C. Simmons, C. Ellis, S. Shiva, D. Dasgupta, and Q. Wu, AVOIDIT: A Cyber Attack Taxonomy

Z. Wu, Y. Ou, and Y. Liu, A Taxonomy of Network and Computer Attacks Based on Responses, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, 2011.
DOI : 10.1109/ICM.2011.363