4Lawrence A, Martin P, William L, et al. CSI/FBI Computer Crime and Security Survey 2004[EB/OL]. http://www.cybercrime. gov/CSI_FBI.htm, 2004-06-20
5Bellovin S M. Distributed Firewalls[EB/OL]. http://www. research.att.com/~smb/papers/distfw. pdf, 2004-06-25
6Spinellis D.Reliable identification of bounded-length viruses is NP-complete[J].IEEE Transactions on information Theory,2003,49(1):280-284.
7Tesauro G J,Kephart J O.Neural networks for computer virus recognition[J].IEEE Expert, 1996,8:5-6.
8Symantec Corporation. Understanding heuristics : symantec ' s blood hound technology[DB/OL].Symantec White Paper Series,Volume XXXIV.http:// www.symantec.com /avcenter /reference /heuristc.pdf.
9Kolter J Z,Maloof M A.Learning to detect malicious executables in the wild[C]//KDD'04:Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York:ACM Press 2004 470-478.
10Hansen L K.Salamon P.Neural network ensembles[J].IEEE Trans Pattern Analysis and machine Intelligence, 1990,12(10):993-1001.