1[5]Wenkie Lee, Salvatore J Stolfo, Kui W Mok. Mining in a data-flow environment:experience in network intrusion detection. Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, San Diego, California, USA August 1999:114-124.
2Jiawei Han,Jian Pei.Simon Fraser Sequential Pattern Mining:From Shopping History Analysis to Weblog and DNA Mining.University,Canada:
3Wenke.Lee.A Aata Mining for Constructing Feature and Model for Intrusion Detection System[D].COLUMBIA UNIVERSITY,1999.
4Wenke.Lee.,S.J.Stolfo,K.W.Mok.Algorithms For Mining System Audit Data[R].In Proceedings of the 1999 IEEE Symposium on Security and Privacy,1999.
5R.Agrawal,T.Imielinaki,A.Swami.Mining assosiation rules between sets of items in large database[C].Washington,D.C:In Proc.of the ACM SIGMOD Conference on Management of Data,1993:207-216.
6R.Agrawal,R.Srikant,Mining Sequential Patterns[R].Proceedings of the 11th International Conference on Data Engineering,1995.
7R.Agrawal and R.Srikant.Mining Sequential Patterns:Generalizations and Performance Improvements[R].Proceeding of the Fifth Int'l Conference on Extending Database Technology (EDBT),1996:3-17.
8R.Agrawal,A.Arning,T.Bollinger,M.Mehta,J.Shafer,R.Srikant:The Quest Data Mining System[R].Portland:Proc.of the 2nd Int'l Conference on Knowledge Discovery in Databases and Data Mining,Portland,1996.
9R.Agrawal and R.Srikant.Mining Generalized Assosiation Rules[R].Zurich:In Proceeding of the 21st Int'l Conference on Very Large Database,1995.
10R.Agrawal and R.Srikant.Fast algorithms for mining association rules[R].Santiago:In Proceedings of the 20th VLDB Conference,1994.