1[2]Duda RO,P E Hart,D G Stork.Pattern Classification,2nd Edition.Beijing:China Machine Press,2004.576-580
2[3]I T Jolliffe.Principal Component Analysis.2nd Edition.New York:Springer-Verlag,2002
3[5]W Fan,W Lee,A Prodromidis,et al.Cost-based modeling for Fraud and intrusion detection:Results from the JAM project Sal Stolfo.The 2000DARPA Information Survivability Conf and Exposition(DISCEX'00).Hilton Head,SC,2001
4[6]W Lee,S Stolfo,K Mok.A data mining framework for adaptive intrusion detection.The 1999 IEEE Symp on Security and Privacy,Los Alamos,CA,1999
5[7]W Lee,S Stolfo.A framework for constructing features and models for intrusion detection systems.ACM Trans on Information and System Security,2000,3(4):227-261
6[8]W Lee,S Stolfo,K Mok.A data mining framework for adaptive intrusion detection.The 1999 IEEE Symp on Security and Privacy,Los Alamos,CA,1999