4Ye N. A Markov chain model of temporal behavior for anomaly detection. In: Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000, 166~169
5Jha S., Tan K., Maxion R.A., Roy A. Markov chains, classifiers and intrusion detection. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, 2001, 206~219
6Hofmeyr S.A., Forrest S., Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3): 151~180
7Lee W., Dong X. Information-Theoretic measures for anomaly detection. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, California, 2001, 130~143
8Eskin E., Lee W., Stolfo S.J. Modeling system calls for intrusion detection with dynamic window sizes. In: Proceedings of the DARPA Information Survivability Conference and Exposition II (DISCEX II), Anaheim, CA, 2001, 165~175
9Yeung D., Ding Yu-Xin. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition, 2003, 36(1): 229~243
10Rabiner L., Juang B. Fundamentals of Speech Recognition. Prentice-Hall International Inc, 1993