1[1]Andreas Fuchsberger,Intrusion Detection Systems and Intrusion Prevention Systems,Information Security Technology Report,2005.10:134-139.
2[2]CSI/FBI annual computer crime and security survey.Computer Security Institute.
3[3]Phoung Yarng,etc,Profiling Cyber Attacks using Alert Regression Profiles,IEEE GLOBECOM,2003,1456-1551.
4[4]Linda Dailey Paulson,Stopping intruder out of the gates,compute,2002,20-23.
5[5]Zong-pu Jia,etc,An Expert System for Preventing and Auditing Intrusion,The 9th International Conference on Com.
6[6]Nen-Fu Huang,etc,Apply Data Mining to Defense-in-Depth Network Security System,IEEE 2005,Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05).
7[8]Sourcefire,Inc.Next-generation intrusion prevention:Accounting for the attack timeline,Information Security Technical Report,2005,10:162-168.