9DENNING DE. An intrusion detection model[ J]. IEEE Transactionson Software Engineering, 1987, 13 (2): 222 - 232.
10ANDERSON R, KHATLOK A. The use of information retrieval techniques for intrusion detection[ A]. Web proceedings of the First International Workshop on Recent Advances in Intrusion Detection(RAID 98) [ C]. http://www. raid - symposium. org/raid, 1998 -03.