1[1]Wenke Lee,Salvatore J Stolfo,Kui W Mok. A Data Mining Framework for Building Intrusion Detection Models[C].In:Proceedings of the 1999 IEEE Symposium on,1999:120~132
2[2]Stephe Kent. On the trail of Intrusion into Information Systems[J].IEEE Spectrum,2000
3[3]Nong Ye,Xiangyang Li,Qiang Chen. Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data[J].Man and Cybernetics,Part A ,IEEE Transactions on,2001:31 (4) :266~274
4[4]W W Cohen. Fast effective rule induction In Machine Learning[C].In: the 12th International Conference, Lake Taho,CA, 1997
5[5]Mauro Cesar Bernardes,Edson dos Santos Moreira. Implementation of an Intrusion Detection System Based on Mobile Agents[C].In :Software Engineering for Parallel and Distributed Systems,2000 Proceedings International Symposium on, 2000