9Gong R,Zulkernine M,Abolmaesumi P.A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection[C]//Proc. of Sixth ACIS International Conference on Software Engineering,Artificial Intelligence,Networking,and Parallel/Distributed Computing.Maryland; IEEE Press,2005:246-253.
10El-Semary A,Edmonds J,Gonzalez-Pino J,et al.Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection[C]//Proc.of Information Assurance Workshop.West Point,NY:IEEE Press,2006.100-107.