5Matthew V M, Philips K C.An analysis of the 1999 DARPA/Lincoln laboratories evaluation data for network anomaly detection[E/OL].Florida Institute of Technology Technical Report TR-CS-2003-02, http://www.cs.fit.edu/~mmahoney.
6Andrew H.Sung.Identify important features for intrusion detection using support vector machines and neural networks[A].IEEE Proceedings of the 2003 Symposium on Application and the Internet[C], 2003.