4Lee W, Stolfo S J and Mok K. Data mining in work flow environments : Experiences in intrusion detection[C]. In : Proceedings of 1999 Conference on Knowledge Discovery and Data Mining(KDD-99),1999.
5Christina Warrender, Stephanie Forrest, and Barak Pearlmutter.Detecting intrsions using system calls : alternative data models[C]. Inz Proceedings of the 1999 IEEE Symposium on Securityand Privacy, 135~145. IEEE Computer Society, 1999.
6Li Tao. The fundamental theory of big-neuron[C]. Proc. of ICNNSP95,Nanjing,China, 1995.12.
7Rud O P. Data Mining Cookbook..ModelingData for Marketing ,Risk,and Customer Relationship Management[M]. USA=John Wiley & Sons Inc, 2001,203-222.
8Hagan M T, Demuth H B, Beale M H. Neural Networks Design IMP. United States of America:Thomson Learning Publishing Company, 2002. 197-258.
9Simon Haykin. Neural Networks: A Comprehensive Foundation, 2nd Edition [M]. United States of America PearsonEducation,2002. 159-255.