8Anderson J P. Computer Security threat monitoring and surveillance[R]. Technology Report, James P Anderson Co., Fort Washington, Pennsylvanin, 1980.
9Canndy J. Artificial neural network for misuse detection[J]. Proceeding of the 1998 National Information System Security Conference (NI-SSC' 98), 1998, (10): 5-8: 443-456.
10Steven A H. An immunological model of distributed detectionand its application to computer security[D]. [s.l]: University of New Mexico, 1999.