1MICHAEL J A B, LINOFF G.Data Mining Techniques: For Marketing, Sales,and Customer Support[M].New York:Wiley, 1997.
2JOSEPH P B. Data Mining with Neural Networks[M].New York:McGraw-Hill,1996.
3USAMA M F.Gregory Piatetsky-Shapiro,Padhraic Smyth,From Data Mining to Knowledge Discovery: An Overview[A].FAYYAD U M,PIATESTKY-SHAPIRO G,SMYTH P,et al.Advances in Knowledge Discovery and Data Mining[C].AAAI Press/The MIT,1996.
4LEE Wenke,STOLFO Sal,MOK Kui. Mining Audit Data to Build Intrusion Detection Models[C].New York:Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining(KDD′98),1998.
5LEE Wenke. STOLFO Sal,MOK Kui.A Data Mining Framework for Building Intrusion Detection Models[C]. Oakland CA:Proceedings of the 1999 IEEE Symposium on Secruity and Privacy,1999.
6LEE Wenke,STOLFO Sal.Data Mining Approaches for Intrusion Detection[C]. San Antonio,TX:Proceedings of the 7th USENIX Security Symposium,1998.
7PORTNOY L,ESKIN E, STOLFO S J. Intrusion Detection with Unlabeled Data Using Clustering[C]. Philadelphia:Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA-2001),ACM Press,2001.
8RICHARD P L,DAVID J F,ISAAC G,et al.Evaluating Intrusion Detection System:The 1998 DARPA Off-Line Intrusion Datection Valuation[C].Hilton:Proceedings of the 2000 DARPA Information Survivability Conference and Exposition,AAAI Press,2000.
9BARBAR D,COUTO J.JAJODIA S,et al.ADAM:Detecting Intrusions by Data Mining[M].West Point,NY:Proceedings of the IEEE SMC Information Assurance Workshop,2001.
10MUKKAMALA R,GAGNON J,JAJODIA S.Integrating Data Mining Techniques with Intrusion Detection Methods[R].Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security:Research Advances in Database and Information Systems Security,1999.