1[1]Dorothy D. An Intrusion Detection Modol[A].IEEE Symp. on Security Privacy[C], 1986:118-131
2[2]Kumar S. Classification and Detection of Computer Intrusions. Purdue University, 1995
3[3]Porras P A, Kemmerer R A. Penetration State Transition Analysis-A Rule-based Intrusion Detection Approach. In: Eighth Annual Computer Security Applications Conference ,IEEE Computer Society Press,1992-11-30:220-229
4[4]Spafford E H. Intrusion Detection Using Autonomous Agents.Computer. Networks, 1999
5LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
6LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
7KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
8LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.