4J.C.Fabre,T.Perennou.A Meta object Architecture for Fault:Tolerant Dis-tributed Systems:The FRIENDS Approach.IEEE Transactionson computers[J] ,Special Issue on Dependability of Computing Systems,1998,47(1):78-95.
5Ryutov T, Neuman C. Integrated Access Control and Intrusion Detection for WebService [C]. Proc. of the 23th International Conference on Distributed Computing Systems (ICDCS'03), Dongho Kim: IEEE Press,2003:374-413.
6Kayacik H G, Zincir-Heywood A N, Heywood M I. A hierarchical SOM-based intrusion detection system [J]. 2007,20(4): 439-451.
7Kuo Zhao,NurboI,Fei Ren,et al. Surveys on the Intrusion tolerance System,Communications in Computer and Information Science 2008.
8Powers S T, He J.A hybrid artificial immune system and Self Organising Map for network intrusion detection [J]. 2008.
9Gong F M. Intrusion Prevention: Myths, Challenges,and Requirements[EB/OL]. http://wvcw.mcafee.com/us/local_content/ white_apers/wp_intrusionprevention.pdf. 2010.