1ZSEBY T, FOKUS F, MOLINA M, et al. Sampling and Filtering Techniques for IP Packet Selection [ EB/OL ]. [2007 - 01 - 20]. http://www, ieff. org/html, charters/psamp-charter, html.
2HELMAN P, BHANGOO J. A Statistically Base System for Prioritizing Information Exploration Under Uncertainty [ J ]. IEEE Transactions on Systems, Man and Cybernetics, Systems and Humans, 1997, Part A:27.
3STEFANOS M, MARVIN C, DAN Z, et al. A Data Mining Analysis of RTID Alarms [J]. Computer Networks, 2000, 34,571 - 577.
4ALBUS J S. A New Approach to Manipulator Control[ J ]. Trans ASME J Dyn Syst Meas Contrl, 1975.97:220 -227.
5SRILATHA C. , AJITH A. , THOMAS P. Feature Deduction and Ensemble Design of Intrusion Detection System [J]. Computer & Security, 2004(9) :26 -32.