1[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8
2[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4
3[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986
4[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232
5[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988
6[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997
7[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988
8[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988
9[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989
10[1]Jiawei Han,Micheline Kamher. Data Mining:Concepts and Techniques [M].China Machine Press,2002