1GARC1A A,JUAN J P,KATZA A. Intrusion detection in web applications using text mining[J].Engineering Applications of Artificial Intelligence,2007,(04).
2ANTONATOS S,ANAGNOSTAKIS K G. Generating realistic workloads for network intrusion detection systems[J].ACMSIGSOFT Software Engineering Notes,2004,(01).
3KAI HONGMEI,ZHU HONGBING,KEIE. Anovel intelligent intrusion detection,decision,response system[J].IEICE Transactions on Fundamen tals of Elect ronics Communications and Computer Sciences,2006,(06).
4XIAO LING YE,YING CHAO ZHANG,CHAO LONG ZHANG. Amobileagent and snort based distributed intrusion detection system[A].Xiamen.China,2009.