7Ammann P, Jaiodia S, McCollum C D, et al. Surviving information warfare attacks on databases. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, 1997. 164-174 被引量:1
8Lippmann R, Fried D, Graf I, et al. Evaluating intruston detection systems: The 1998 darpa off-line intrusion detection evaluation. In: Proc. of 2000 DARPA Information Survivability Conference and Exposition,Los Alamitos, CA, 2000. 12-26 被引量:1
9Stolfo S, Fan D, Lee W. Credit card fraud detection using metalearning: Issues and initial results. In: Proc. of AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, California, USA, 1997.83-90 被引量:1
10Axelsson S. Intrusion Detection Systems: A Survey and Taxonomy: [Technical Report]. 99-15. Chalmers University of Technology, Dept of Computer Engineering, Goteborg, Sweden, 2000 被引量:1