1GHOSH A K, SCHWARTZBARD A. A study in using neural networks for anomaly and misuse detection[A]. Proceedings of the 8th USENIX Security Symposium[C]. Washington D C:ASME Press, 1999. 23-26,
3DWYER J. In pursuit of a piece of the ROC[J]. Radiology, 1997,20(2): 621-625.
4CUNNINGHAM R, LIPPMANN R, FRIED D, et al, Evaluating intrusion detection systems without attacking your friends: the 1998 DARPA intrusion detection evaluation[A]. Proceedings of Third Conference and Workshop on Intrusion Detection and Response[C]. San Diego, CA, 1999. 35-47.
6XU R U I,WUNSCH D I.Survey of clustering algorithms[J].Neural Networks,IEEE Transactions on,2005,16(3):645-678.
7DUIN R W,PEKALSKA E.The science of pattern recogni-tion,achievements and perspectives,studies in computationalintelligence[J].Studies in Computational Intelligence,2007,63(1):221-259.
8FAWCETT T.An introduction to ROC analysis[J].PatternRecognition Letters,2006,27(8):861-874.
9LANDGREBE W C,DUIN W P.Approximating the multi-class ROC by pairwise analysis[J].Pattern Recognition Let-ters,2007,28(13):1747-1758.
10BRADLEY A P.The use of the area under the ROC curve inthe evaluation of machine learning algorithms[J].PatternRecognition,1997,30(7):1145-1159.