12.Smaha S E.Haystack An intrusion detection system.In IEEE Four- th Aerospace Computer Security Applications Conference,USA:Or- lando,FL,Dec.1988
23.Levitt K N,Heberlein L T,Mukherjee B.A method to detect intru- sive activity in a networked environment.In 14th National Computer Security Conference,Washington,DC,USA:Oct.1991:362-371
34.Pagurek B,White T,Bieszczad A.A Network modeling for manage- ment applications using intelligent mobile agents.Journal of Network and Systems Management,September 1999;7(3)
45.Vigna G,Fuggetta A,Picco G P.Understanding code mobility.IEEE TRANSACTIONS On Software Engineering,1998;24(5):342-361
56.Picco G P,Baldi M.Evaluating the tradeoffs of mobile code design paradigms in network management applications.In the 20th Interna- tional Conference on Software Engineering ICSE'98,Kyoto,Japan: IEEE CS Press,April 1998
67.Lane T,Brodley C E.Temporal sequence learning and data reduc- tion for anomaly detection.In Proceedings of the Fifth ACM Confer- ence on Computer and Communications Security,1998:150-158
78.Bishop M,Dilger M.Checking for race conditions in file accesses. Computing Systems,Spring 1996;9(2):131-152
81,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
92,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
103,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48