4[4]Seiden K F,Melanson J P.The Auditing Facility for a VMM Security Kernal[C].Proceedings 1990 IEEE Computer Society Sysposium on Reserch in Security and Privacy,1990(5):261-277.
5[5]Teng HS,Chen K,Lu S C-Y.Adaptive Real-time Anomaly Detection Using Inductively Generation Sequential Patterns[A].Proceedings IEEE Computer Society Sysposium on Reserch in Security and Privacy,1990(5):278-284.