1Li Z,Das A,Zhou J.Theoretical basis for intrusion detection[C] //Proceddings of 6th IEEE Information As surance Workshop(IAW),West Point,NY,2005(7):1 5-17. 被引量:1
5Lee Wenke,Stolfo Salvatore J.A Framework for Constructing Features and Models for Intrusion Detection Systems U].ACM Transactionson Information and System Security,2000,3(4). 被引量:1
4Lee Wen-ke. A framework for constructing features and models for intrusion detection systems [ J]. ACM Transactions on Information and System Security,2000,3 (4) : 227-261. 被引量:1
5Denning D E. An intrusion-detection model [ J ]. IEEE Transaction on Software Engineering, 1987,13:222-232. 被引量:1
6Heberlein L T. A network security monitor [C]//Proceeding of the IEEE Symposium on Researching Security and Privacy. Oakland, CA : IEEE, 1990:296-304. 被引量:1
7Jiawei Han,Micheline Kamber.Data minning concepts and techniques[M].北京:机械工业出版社,2006. 被引量:1
8Lee W.A data mining framework for constructing features and models for intrusion detection systems [D].New York:Columbia University, 1999. 被引量:1
9Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页 被引量:1