2Chen M S, Park J S, Yu P S. Data mining for path traversal patterns in a web environment[EB/OL]. [2007 - 11 - 23]. http://citeseer. ist. psu. edu/8204.html.
3Catledge L, Pitkow J. Characterizing browsing behaviors on the world wide web [ EB/OL ]. [ 2007 - 11 - 17 ]. http://smartech. gatech. edu/handle/1853/355.
4Zeinab Abbassi, Vahab S Mirrokno. A recommender system based on local random walks and spectral methods [ C]//9th WEBKDD and 1th SNA - KDD Workshop' 07. USA California, 2007.
5Russinovich MR, Solomon DA. Microsoft windows Internals:WindowsServer 2008 and Windows Vista[M]. 5th ed. USA: Microsoft Press,2012.246-266.
9Michael Robinson. The SCADA threat landscapeIC]//Proceedings of 1st International Symposium for ICS & SCADA Cyber Security Research, 2013:33-41.
10Yasakethu S.L.P., Jiang J. Intrusion detection via machine learning for SCADA system protection[C]//Proceedings of 1st International Symposium for ICS & SCADA Cyber Security Research, 2013:1111-105.