3[1]Wenke Lee,Salvatore J Stolfo,Kui W Mok. A Data Mining Framework for Building Intrusion Detection Models[C].In:Proceedings of the 1999 IEEE Symposium on,1999:120~132
4[2]Stephe Kent. On the trail of Intrusion into Information Systems[J].IEEE Spectrum,2000
5[3]Nong Ye,Xiangyang Li,Qiang Chen. Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data[J].Man and Cybernetics,Part A ,IEEE Transactions on,2001:31 (4) :266~274
6[4]W W Cohen. Fast effective rule induction In Machine Learning[C].In: the 12th International Conference, Lake Taho,CA, 1997
7[5]Mauro Cesar Bernardes,Edson dos Santos Moreira. Implementation of an Intrusion Detection System Based on Mobile Agents[C].In :Software Engineering for Parallel and Distributed Systems,2000 Proceedings International Symposium on, 2000
8Edward G Amoroso.Fundaments of Computer Security Technology[M]. Upper Saddle River,NJ:Prentice-Hall PTR,1994.
9S J Stolfo,A L Prodromidis,S Tselepis et al.JAM:Java agents for metalearning over distributed databases[C].In:Proceedings of the 3^rd International Conference on Knowledge Discovery and Data Mining,Newport Beach ,CA ,AAAI Press, 1997:74-81.
10P K Chan,S J Stolfo.Toward parallel and distributed learning by metalearning[C].In:AAAI Workshop in Knowledge Discovery in Databases, 1993 : 227-240.