1SUNG A H, MUKKAMALA S. Identifying important fea- tures for intrusion detection using support vector machines and neural networks [ C ] //Proceedings of the 2003 Inter- national Symposium on Applications and the lnternet Tech- nology. IEEE Computer Society Press,2003, 209 - 216.
2PAWLAK Z. Rough set theory and its applications to dataanalysis [ J]. Cybernetics and Systems 1998, 29 (7) :661 - 688.