4[3]Lee W,Stolfo S J.Data Mining Approaches for Intrusion Detection.In Proceeding of the 7th USENIX Security Symposium,San Antonio,TX,1998-01
5[4]Agrawal R,Srikant R.Fast Algorithms for Mining Association Rules.Proceeding of the 20th VLDB Conference,Santiago,Chile,1994
6[5]Mannila H,Toivonen H.Discovering Generalized Episodes Using Minimal Occurrences.Proceedings of the 2nd International Conference on KDD and DM,1996.08
7[6]Cohen W W.Fast Effective Rule Induction.from Machine Learning.Proce,dings of the 12th International Conference,1995
8[7]Mitchell T.Machine Learning.McGraw-Hill,1997
9LEE W.A Data Mining Framework for Constructing Feature and Models for Intrusion Detection System[D].PhD Dissertation,Columbia University,1999.
10CHUNG C Y,GERTZ M,LEVITT K.Discovery of Multi-Level Security Policies[C].The Fourteenth Annual IFIP WG 11.3 Working Conf.On Database Security,2000.