4Bass T.Intrusion detection systems and multisensor data fusion:creating cyberspace situational awareness.Communications of the ACM,2000;43(4):99-105.
5Lau S.The spinning cube of potential doom.Communications of the ACM,2004; 47(6):25-26.
6Yurcik W.Visualizing NetFlows for security at line speed:the SIFT tool suite.Proceedings of the 19th Usenix Large Installation System Ad-ministration Conference(LISA),San Diego,CA USA,Dec,2005; 169-176.
7Melssen W J.Determination of optimal support vector regression parameters by genetic algorithms and simplex optimization.Analytical Chimica Acta,2005;544(1):292-305.