5Ammann P, Jajodia S,McCollum C D,et al. Surviving information warfare attacks on database [A]. Proceedings of the IEEE symposium on security and privacy[C].New York:IEEE, 1997.164-174. 被引量:1
6Liu P, Jajodia S. Muliti-phase damage connement in database systems for intrusion tolerance[A].Proc 14th IEEE computer security foundations workshop[C].New York:IEEE,2001.191-205. 被引量:1
7Liu P.Architecturesforintrusiontolerant database systems[C].San Diego California,2002. 被引量:1
8Stolfo S,Fan D,Lee W. Credit card fraud detection using metalearning: Issues and initial results. In:Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 1997 被引量:1
9Axelsson S. Intrusion Detection Systems: A Survey and Taxonomy, Chalmers University of Technology, Dept. of Computer Engineering, Go'' teborg, Sweden: [Technical Report 99-15]. 2000 被引量:1
10Allen J,et al. State of the Practice of Intrusion Detection Technologies: [Technical Report CMU/SEI-99-TR-028 ]. ESC-99-028, Carnegie Mellon University, Software Engineering Institute, Jan. 2000 被引量:1