3Hall, Mark. Web application vulnerabilities on rise[M]. Computerworld, Elsevier Inc, 2007.
4Heady R, Luger G, Maccabe A, et al. The architecture of a network level intrusion detection system[R]. Technical report, Computer Science Department, University of New Mexico, August 1990.
5Xydas I. Host-based web anomaly intrusion detection system, an artificial immune system approach[C]//Proceedings of the lASTED International Conference on Artificial Intelligence and Applications, 2008:258-265.
6Shaimaa E S, Mohamed I M, Laila M E, et al. Web Server Logs Preprocessing for Web Intrusion Detection[J].Computer and Information Science, 2011.
7MA J B, YU H W, GAO C L. Study of the Issue of Personnel Promotion Based on Fuzzy Comprehensive Evaluation[C]//Information Science and Management Engineering (ISME), 2010:511-513.
8LEU, Sou-Sen ; CHANG, Ching-Miao, Bayesian-network-based safety risk assessment for steel construction projects[C]//Accident; analysis and prevention, 2013:122-33.