3Eugene H Spafford, Diego Zamboni. Intrusion Detection Using Autonomous Agents[J]. Computer Networks, 2000,34: 547-570. 被引量:1
4Richard Lippmann, Joshua W Haines, David J Fried. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation[C]. The 3rd International Symposium on Recent Advances in Intrusion Detection, Berlin Heidelberg: Springer, 2000. 162-182. 被引量:1
5S Staniford Chen, B Tung. The Common Intrusion Detection Framework Architecture [EB/OL]. http://www.isi.edu/gost/cidf/drafts/2001/architecture.txt, 2003. 被引量:1
6J S Sherif,T G Dearmond.Intrusion Detection:Systems and Models[C]. Proceedings of the 11th IEEE International Workshops, Pennsylvania: IEEE Computer Society, 2002.115-133. 被引量:1
7Carla Marceau. Characterizing the Behavior of a Program Using Multiple-length N-grams[C]. Proceedings of the New Security Paradigms Workshop, Cork, Ireland: USENIX, 2000. 68-74. 被引量:1
8Juan M Estevez-Tapiador, Pedro Garcia-Teodoro, et al. Anomaly De-tection Methods in Wired Networks: A Survey and Taxonomy [J]. Computer Communications,2004,27(16):1569-1584. 被引量:1
9Ke Wang,Salvatore J Stolfo. Anomalous Payload-based Network Intrusion Detection[C]. The 7th International Symposium on Recent Advances in Intrusion Detection, Berlin Heidelberg: Springer, 2004. 203-222. 被引量:1
10Mizuki Oka,Yoshihiro Oyama, Hirotake Abe. Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix[C]. The 7th International Symposium on Recent Advances in Intrusion Detection, Berlin Heidelberg: Springer, 2004. 223-237. 被引量:1