Intrusion detection: A bibliography