3Lee W, Stolfo S J. Data mining approaches for intrusion detection [C]// Proceedings of the 7th USENIX Security Symposium. San Antonio, USA: USENIX Assoc, 1998: 79-93.
4Lippmann R P, Cunningham R K. Improving intrusion detection performance using keyword selection and neural networks [J]. Computer Networks, 2000, 34: 597-6O3.
5Zhang Z, Li J, Manikopoulos C N, et al. HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification [C]// Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. West Point, NY: United States Military Academy, 2001: 85-90.
6IEEE802.11 Working Group. 2007. IEEE standard for information technology- Telecorrmaunications and information exchange between systems-Local and metropolitan area networks-Specific requirements- Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications 2007 [EB/OL]. [2009-08-28]. http://standards. ieee. org/getieee802/ download/802.11-2007.pdf.
7Welch C D J, Lathrop M S D. A Survey of 802. 11a Wireless Security Threats and Security Mechanisms [R]. West Point, New York: United States Military Academy, 2003.