1[1]D E Denning. An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering, 1987;SE-13(2) :222-2 被引量:1
2[2]G Vigna,R A Kemmerer. NetSTAT:A Network-based Intrusion Detection Approach[C].Proceedings of the 14th Annual Computer Security Conference,Scottsdale,Arizona, 1998.12 被引量:1
3[3]S Kumar. Classification and Detection of Computer Intrusions[D].PhD Dissertation. Department of Computer Sciences,PurdueUniversity,1995 被引量:1
4[4]J Balasubramaniyan,J Omar Garcia-Fernandez,D Isacoff et al.An Architecture for Intrusion Detection using Autonomous Agents[R].Department of Computer Sciences,Purdue University,Coast TR 98-05,1998 被引量:1
5[5]Frincke D,Don Tobin,Jesse McConnell et al.A Framework for Cooperative Intrusion Detection[C].Proceedings of the 21 st National Information Systems Security Conference,1998.10:361-373 被引量:1
6[6]W Lee,S J Stolfo,K Mok. A Data Mining Framework for Building Intrusion Detection Models[C].Proceedings of the IEEE Symposium on Security and Privacy, 1999 被引量:1
7[7]Guy Helmer,Johnny S K Wong,Vasant Honavar et al.Intelligent Agents for Intrusion Detection[C].Proceedings,IEEE Information Technology Conference, Syracuse, NY, 1998.9:121-124 被引量:1
8[8]M Conner,C Patel,M Little. Genetic Algorithm/Artificial Life Evolution of Security Vulnerability Agents[C].Army Research Laboratory Federal Laboratory 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program(ATIRP),1999.2 被引量:1
9[9]Jacobs S,D Dumas,W Booth et al.Security Architecture for Intelligent Agent Based Vulnerability Analysis[C].Proceedings:3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution Research Program, College Park, MD.37,1999.2: 447-451 被引量:1
10[10]Barrett Michael,W Booth,M Conner et al. Intelligent Agents System Requirements and Architecture[R].Report to ATIRP,1998.10 被引量:1