3Selim SZ, Alsultan K. A Simulated Annealing Algorithm for the Clustering Problem. Pattern Recognition. 1991,24(10): 1003 - 1008.
4Fayyad U, Reina C, Bradley PS. Initialization of Iterative Refinement Clustering Algorithms. Microsof~ Research Technical Report MSR-TR-98- 38. June 1998.
5Faber V. Clustering and the Continuous k-Means Algorithm.http://library.lan.lgov/cgi-bin/getfile?00412 967. pdf.1994.
6Larsen B, Aone C. Fast and Effective Text Mining Using Lineartime Document Clustering. Proc. of the fifth ACM SIGKDD International Conf. on Knowledge Discovery and Datamining. San Diego, 1999:16 - 22.
7吴焱.入侵者检测技术[M].北京:电子工业出版社,2011:38-42.
8Arbaugh W A. Windows of vulner ability:Acase study analysis [J].IEEE Comput, 2010: 16-48.
9Lee W,Stolfo S J. Data mining approaches for intrusion detection[C].Proceedings of the 1998 USENIX Security Symposium, 1998:45-60.
10Asaka M,Taguchi A,Goto S.The implementation of IDA:An intrusion detection agent system[C].Proc.of the l lth FIRST Conf. 1999. Brisbane,2011:1083-1176.