4[3]Lee W,Stolfo S J.Data Mining Approaches for Intrusion Detection.In Proceeding of the 7th USENIX Security Symposium,San Antonio,TX,1998-01
5[4]Agrawal R,Srikant R.Fast Algorithms for Mining Association Rules.Proceeding of the 20th VLDB Conference,Santiago,Chile,1994
6[5]Mannila H,Toivonen H.Discovering Generalized Episodes Using Minimal Occurrences.Proceedings of the 2nd International Conference on KDD and DM,1996.08
7[6]Cohen W W.Fast Effective Rule Induction.from Machine Learning.Proce,dings of the 12th International Conference,1995
8[7]Mitchell T.Machine Learning.McGraw-Hill,1997
9Ghosh A. , Schwartzhard A.. A study using neural networks for anomaly and misuse detection. In: Proceedings of the USENIX Security Symposium, Washington D C,1999, 141-151
10Mukkamala S. , Janoski G. H. et al. Intrusion detection, Support vector machines and neural networks. In: Proceedings of the IEEE International Joint Conference on Neural Networks,Honolulu, USA, 2002, 1702-1707