1Zhao-qi Bian, et al. Pattern Recognition. Beifing: Tsinghua University Press, 2001.
2Lee W, Stofo S L, Mok K W. Algorithms For Mining System Audit Data [EB/OL], 1999.
3Honig A ,Howard A,Stolfo S. Adaptive Model Generation, An Architecture for Deployment of Data Miningbased Intrusion Detection Systems [EB/OL], 2002.
4Han Jiawei, Kamber M. Data Mining: Concepts and Techniques [M]. [s. 1.], [s, n.], 2001.
5Lane T, Brodley CE. Detecting the Abnormal : Machine Learning in Computer Security, 1997-01.
6Mitchell T. Machine Learning [M]. [s. 1. ]: McGraw-Hill, 2003.
7Sun Chen-Tsai. Interpolative Reasoning in Distributed Intelligent Systems Based on Fuzzy Sets and Neural Nets. Preprints IFAC Int Symp. On Distributed Intelligent Systems. Arlington, VA: IEEE Control System Socicty, 1991.
8Zeng-xi Sun, et al. Theory and Technology of Intelligence Control. Beijing.. Tsinghua University Press,2001.