1Bace R. Intrusion Detection. New York: Macmillan Technical Publishing, 2000
2Forrest S, Hofmeyr S A et al. A sense of self for Unix processes. In: Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996. 120~128
3Cohen W W. Fast effective rule induction. In: Proceedings of the 12th International Conference, Lake Taho, California, 1995. 115~123
4Lee W, Stolfo S, Chan P. Learning patterns from Unix process execution traces for intrusion detection. In:Proceedings of AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, 1997. 191~197
5Wespi A, Dacier M et al. Intrusion detection using variable-length audit trail patterns. In: Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), Toulouse, France, 2000. 110~129
6Asaka M, Onabuta T, Inoue T, Okazawa S, Goto S. A new intrusion detection method based on discriminant analysis. IEICE Transactions on Information and Systems,2001, E84D (5): 570~577
7Pawlak Z . Rough Sets-Theoretical Aspect of Reasoning about Data. Dordrecht: Kluwer Academic Publishers, 1991
8Vinterbo S,hrn A. Minimal approximate hitting sets and rule templates. International Journal of Approximate Reasoning, 2000, 25(2):123~143