3Eugene H Spafford, Diego Zamboni. Intrusion Detection Using Autonomous Agents[J]. Computer Networks, 2000,34: 547-570. 被引量:1
4Richard Lippmann, Joshua W Haines, David J Fried. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation[C]. The 3rd International Symposium on Recent Advances in Intrusion Detection, Berlin Heidelberg: Springer, 2000. 162-182. 被引量:1
5S Staniford Chen, B Tung. The Common Intrusion Detection Framework Architecture [EB/OL]. http://www.isi.edu/gost/cidf/drafts/2001/architecture.txt, 2003. 被引量:1
6J S Sherif,T G Dearmond.Intrusion Detection:Systems and Models[C]. Proceedings of the 11th IEEE International Workshops, Pennsylvania: IEEE Computer Society, 2002.115-133. 被引量:1
7Carla Marceau. Characterizing the Behavior of a Program Using Multiple-length N-grams[C]. Proceedings of the New Security Paradigms Workshop, Cork, Ireland: USENIX, 2000. 68-74. 被引量:1
8Juan M Estevez-Tapiador, Pedro Garcia-Teodoro, et al. Anomaly De-tection Methods in Wired Networks: A Survey and Taxonomy [J]. Computer Communications,2004,27(16):1569-1584. 被引量:1
9Ke Wang,Salvatore J Stolfo. Anomalous Payload-based Network Intrusion Detection[C]. The 7th International Symposium on Recent Advances in Intrusion Detection, Berlin Heidelberg: Springer, 2004. 203-222. 被引量:1
10Mizuki Oka,Yoshihiro Oyama, Hirotake Abe. Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix[C]. The 7th International Symposium on Recent Advances in Intrusion Detection, Berlin Heidelberg: Springer, 2004. 223-237. 被引量:1
4Chen Xinming, Mu Beipeng, Chert Zhen. NetSecu: A col- laborative network security platform for in-network security [ C ]//2011 3rd International Conference on Communica- tions and Mobile Computing(CMC). 2011:59-64. 被引量:1
5Mohammed M M Z E, Chart H A, Ventura N, et al. An automated signature generation approach for polymorphic worms using principal component analysis[J]. Internation- al Journal of Information Security Research (IJISR), 2011,1:45-52. 被引量:1
6Shen Zihao, Wang Hui. Research on IPv6 intrusion detec- tion system based on state protocol analysis [ C ]//Proceed- ings of the 2nd International Conference on Communication Systems, Networks and Applications. 2010,1:90-93. 被引量:1