1[1]Dorothy D. An Intrusion Detection Modol[A].IEEE Symp. on Security Privacy[C], 1986:118-131
2[2]Kumar S. Classification and Detection of Computer Intrusions. Purdue University, 1995
3[3]Porras P A, Kemmerer R A. Penetration State Transition Analysis-A Rule-based Intrusion Detection Approach. In: Eighth Annual Computer Security Applications Conference ,IEEE Computer Society Press,1992-11-30:220-229
4[4]Spafford E H. Intrusion Detection Using Autonomous Agents.Computer. Networks, 1999