3Lee W, Stolfo S J. Data Mining approaches for intrusion detection[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2000-12-03.
4Manganaris S, Christensen M, Zerkle D, et al. A data mining analysis of RTID alarms[J]. Computer Networks, 2000,34(4):571-577.
5Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31(8):805-822.
6Spafford E H,Zamboni D. Intrusion detection using autonomous agents[J]. Computer Networks, 2000,34(4):547-570.
7Lee W, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models[A]. Proceedings of the 1999 IEEE Symposium on Security and Privacy[C]. Oakland: IEEE, 1999.120-132.
8Lee W, Stolfo S J, Mok K W. Mining audit data to build intrusion detection models[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2001-06-12.
9Lee W, Stolfo S J, Mok K W. Mining in a data-flow environment: experience in network intrusion detection[EB/OL]. http:∥www.cs.columbia.edu/~wenke/, 2001-06-12.