4Huang Ming-Yuh, Wicks Thomas M.. A large scale distributed intrusion detection framework based on attack suategy anatysis[J].Computer Netwoflcs,1999, 31(23-24), 2465-2475.
5Lee W, Stolfo S J, Mok K W. Mining in a data-flow environment:experience in network intrusion detection. In:Han J ed. Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[M].New York:ACM Press, 1999,1(1):114-124.
二级参考文献7
1[1]Wenke L, Salvatore S . Data Mining Approaches for lnrusion Detection. URL: http://www.cs.columbiaedu/~wenke/papers/usenix/ usenix.html, 2000-10-12
2[2]Network Flight Recorder Inc.Network Flight Recorder http://www.nfr com
3[3]Fayyad U , Piatetsky-Shapiro G , Smyth P . From Data Mining to Knowledge Discovery: An Overview. In Fayyad U . PiatetskyShapiro G , Smyth P, and Uthurusamy R, Editors, Adyances in Knowledge Discovery and Data Mining , AAAI/MIT Press,Cambridge, MA, 1996
4[4]Lunt T. Detecting Intruders in Computer Systems. Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993