1Clifford R. Cybercrime : The investigation , prosecution anddefense of a computer-related crime.North Carolina : CarolinaAcademic Press.2001.
2HuntR.New developments in network forensics—?tools andtechniques.ICON 2012.
3KwanY.The research of using bayesian inferential network indigital forensic analysis.Hong Kong : The University of HongKong.2011.
4AgarwalA,Gupta M,Gupta S.Systematic digital forensicInvestigation Model.Intemational Journal of Computer Science andsecurity (IJCSS ) .2011.
5OhJ,LeeS,Lee S.Advanced evidence collection and analysis ofweb browser activity//The proceedings of the eleventh annualDFRWS conference.LA, USA, 2011.
2Debarh H, Wespi A. Aggregation and correlation of intrusion detection alerts//Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID). Davis, CA, USA, 2001:85-103.
3Ning P, Cui Y, Reeves D S. Constructing attack scenarios through eorrelation of intrusion alerts//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, DC, USA, 2002:245-254.
4Andersson D, Fong M, Valdes A. Heterogeneous sensor correlation: A ease study of live traffic analysis//Proceedings of the 2002 IEEE Information Assuranee Workshop. West Point, NY, USA, 2002:1-12.
5Dain O M, Cuningham R K. Building scenarios from a heterogeneous alert stream//Proeeedings of the 2001 IEEE Workshop on Information Assuranee and Security. West Point, NY, 2001:231-235.
6Ning P, Xu D B, Healey C G, Amant R S. Building attack scenarios through integration of complementary alert correlation methods//Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS). San Diego, CA, 2004: 97-111.
7Wang W, Daniels T E. Building evidence graphs for network forensics analysis//Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC' 05). Tucson, AZ, 2005:254-266.
8Pearl J. Graphical models for probabilistic and causal reasoning//Tueker Alien B ed. Computer Science and Engineering Handbook. CRC Press, 1997:697-714.
9Cheng J, Greiner R, Kelly J, Bell D, Liu W. Learning Bayesian networks from data: An information theory based approach. Artifieial Intelligence, 2002, 137 (1-2) : 43-90.
10Cooper G F, Herskovits E. A Bayesian method for the induction of probabilistic networks from data. Machine Learning, 1992, 9(4): 309-347.