3Week Lee.A Date Mining Framework for constructing Features and Models for Intru-Sion Detection System.COLUMBIA UNIVERSITY,1999.
4Lee W,Stolfo S J.A data mining framework for building intrusion detection Model.In:Going L,Reiter MK,eds,Proceedings of the1999IEEE Symposium on Security And Privacy.Oakland,CA:IEEE Computer Society Press,1999:120-132.
5阎永凡,张昌水.人工神经网络与模拟进化计算[M].北京:清华大学出版社,2000.
6Forrest S,Perelson A S,Allen L,Cherukuri R.Self-Nonself Discrimination in a Computer.Proceedings of IEEE Symposiun on Research in Security and Privacy,16-18,May,1994:202-212,Oakland,CA,Also available at ftp://ftp.cs.umn.edu/pub/forrest/virus.Ps.
7Dasgupta D.Immunity-based intrusion detection systems:ageneral framework.Proceedings of the22nd National Information Systems Security Confeerence(NISSC),October18-21,1999.
8Kim J,Bentley P J.Evaluating negative selection in an arti?cial immune system for network intrusion detection.Proceedings of Genetic and Evolutionary Computation Conference2001(GECCO-2001),San Francisco,July7-11,2001:1220-1227.