3Fabio Gonzalez.Dipankar Dasgupta. Neuro-lmmune and Self-Organizing Map Approaches to Anomaly Detection:A Comparison[A]. The Proceedings of the 1st International Conference on Artificial Immune System[C], 2002, (19):101 - 103.
4Aurobindo Sundaram. An Introduction to Intrusion Detection[R], 1996, 40( 1 ) : 17 - 21.
5戴葵(译).神经网络设计[M].北京:机械工业出版社,2002,9..
6Biswanath Mukherjee,L Todd Heberlein,Karl N Levitt.Network Intrusion Detection[J].IEEE NetWork,1994,5(2):42—47.
1[1]K IIgun,et al. State Transition Analysis: A Rule-based Intrusion Detection Approach [ J ]. IEEE Transactions on Software Engineering, 1995,21(3): 181-199.
2[2]S Kumar, et al. A Software Architecture to Support Misuse Instrustion Detection [ C ]. Proceeding of the 18th National Information Security Conference, 1995. 194-204.
3[3]W Lee, et al. Data Mining in Work Flow Environment: Experience in Intrusion Detection[C]. Proceedings of the Conference on Knowledge Discovery and Data Mining( KDD-99), 1999.
4[4]A Ghosh, et al. A Study in Using Neural Networks for Anomaly and Misuse Detecion[C]. In Proceedings of the Eighth USENIX Security Symposium, 1999.
5[5]C Warrender, et al. Detecting Intrusions Using System Calls:Alternative Data Models[ C]. 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society, 1999. 133-145.
6[6]V Barnett,T Lewis. Outliers in Statistical Data[M]. John Wiley and Sons, 1994.
7[7]E Eskin. Signal Detection over Noisy Data Using Learned Probability Distributions [ C ]. Proceeding of the Seventeenth International Confere on Machine Learning(ICML-2000) ,2000.
8[8]W Fan. Cost-senstive, Scalable and Adaptive Learning Using Ensemblebased Methods [ D]. PhD thesis, Columbia University,2001.
9[9]W Fan, et al. A Multiple Model Approach for Cost-sensitive Intrusion Detection [ C ]. Proc 2000 European Conference on Machine Learning, Barcelona, Spain, 2000.
10[10]R Lippmann, et al. Evaluation Intrusion Detection Systems: The 1998 Darpa Off-line Intrusion Detection Evaluation [ C ].Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2000.