Reference

Alias, A.J., Mohd Supian, M.K. and Sim K.Y. 2001. Linux Based Local Area Network 
      Intrusion Detection System. Proceedings of the IEEE Malaysia International Conference on Communications       2001 (MICC2001). Kuala Lumpur, Malaysia.
Chia Keong. 2003. Analysis and Design of Intrusion Detection System Implementation. M.Sc.Comp       Dissertation.Fakulti Sains Komputer dan Teknologi Maklumat, Universiti Malaya.
David Perry. July 2002. PC Answers Issue 108. (Online).       http://www.pcanswers.co.uk/tutorials/default.asp?pagetypeid=2&articleid=7929&subsectionid=607 (1       April 2008).
Fred Cohen. 1990. A Short Course on Computer Viruses. ASP Press.
Fred Cohen. 1991. Trends in Computer Virus Research. (Online). http://vx.netlux.org/lib/afc06.html (1 April       2008).
Hafiz bin Mohd Sarim. 2002. The Effectiveness of Detection Methods in Intrusion Detection Systems.       M.Comp.Sc. Disseratation. Fakulti Sains Komputer dan TeknologiMaklumat, Universiti Malaya.
Indefense Website. 2004. Malicious Code. (Online).       http://www.indefense.com/manuals/white/malicious.htm (1 April 2008).
Jeffrey Kephart and Steve White. 2001. How Prevalent are Computer Viruses? (Online).
      http://www.research.ibm.com/antivirus/SciPapers/Kephart/DPMA92/dpma92.html (1 April 2008).
Lawrence A. Gordon, Martin P. Loeb,William Lucyshyn and Robert Richardson. 2004.
      2004 CSI/FBI Computer Crime and Security Survey. Computer Security Institute
Madihah Mohd Saudi. 2004. Situational Report on Major Worms Outbreaks Up to Year
      2003 in Malaysia. (Online). http://www.mycert.org.my/other_resources/NISER-MYC-PAP-7070-1.pdf (1       April 2008).
Madihah Saudi, Shaharuddin Ismail and Mohd Najib Masdan. 2006.  User Knowledge and Attitude of       Computer Viruses In Malaysia. International Journal of Learning 2006 Volume 13 (8): 112-121.
Malaysia Computer Emergency Response Team. 2005. Incident Statistics 2005. (Online).       http://www.mycert.org.my/abuse-stat/index.html (1 April 2008).
Marko Helenius. 1994.Computer Viruses in Finland - A Questionnaire Survey. Master Thesis of Sciences,       University of Tampere.
Mazni Zambri. 2003. Evaluating Intrusion Detection Systems in a Unix Based Environment. Master       Dissertation of Software Engineering. Fakulti Sains Komputer dan Teknologi Maklumat, Universiti Malaya
McDuffie, R. Steve. 1994. Defending Against Computer Viruses. The CPA Journal.       (Online).http://www.nysscpa.org/cpajournal/old/15703023.htm (1 April 2008).
Microsoft Website. 2004. What is a Virus, Worm or Trojan Horse? (Online).       www.microsoft.com/security/articles/virus101.asp (1 April 2008).
      CyberSecurity Malaysia. 2002. NISER ICT Security Survey for Malaysia 2001/2002. (Online).       http://www.cybersecurity.org.my/ (1 April 2008).
      CyberSecurity Malaysia. 2004. Malaysia ISMS Survey 2003. (Online). http://www.cybersecurity.org.my/       (1 April 2008).
Nicholas Weaver. February 2002. Future Defenses: Technologies to Stop the Unknown
      Attack. (Online). http://online.securityfocus.com/infocus/1547 (1 April 2008).
Roger A. Grimes. 2001. Malicious Mobile Code : Virus Protection for Windows. First
      Edition, 56. O’ Reilly & Associates, Inc. 
Shukor Sanim Mohd Fauzi. October 2003. A Study On Computer Viruses Attacks And
      The Way To Cure Them. Degree Thesis. Faculty Information System Engineering, UITM, Malaysia.
Summers, W.C. and Naimah Mohd. Hussin. November 1991. Computer Viruses and Practicing Safe       Computing. Proceedings of EDUCOMP '91, National Symposium on Educational Computing. Kuala Lumpur,       Malaysia.
Summers, W.C. and Zaidah Ibrahim. November 1991. Computer Literacy – What Should We be Teaching       Our Students? Proceedings of EDUCOMP '91, National Symposium on Educational Computing. Kuala       Lumpur, Malaysia.
Summers, W.C., Zaidah Ibrahim, and Naimah Mohd Hussin. September 1992. Computer Viruses: What They       Are and How to Prevent Them. Federal Publications, Kuala Lumpur.
Summers, W.C. and Zaidah Ibrahim. November 1991. Computer Viruses: What are They and How do We       Combat Them. Proceedings of EDUCOMP '89, National Symposium on Educational Computing. Kuala       Lumpur, Malaysia.
Sureswaran Ramadass, Azlan Bin Osman, Rahmat Budiarto, N. Sathiananthan, Ng Chin
      Keong and Choi Sy Jong. 2003. Real-Time Virus Detection System Using iNetmon Engine. Network       Research Group, School Of Computer Science, University Science Malaysia,  (Online).       www.qgpop.net/2003fukuoka/papers/B6-1.doc (1 April 2008).