1J Hockberg.NADIR:An Automated System for Detecting Network Intrusion and Misuse[J].Computers and Security, 1993; 12(3) :235-248.
2James Cannady,James Mahaffey.The Application of Artificial Neural Networks to Misuse Detection : Initial Results[C].In :Proceedings of First International Workshop on the Recent Advances in Intrusion Detection, 1998-09.
3J S Balasubram,J O Garcia-Fernandez,D Isacoff et al.An Architec ture for Intrusion Detection Using Autonomous agents[C].In :Computer Security Applications Conference, 1998 Proceedings, 14th Annual, 1998: 13-24.
4Ragsdale Daniel J,Carver Curtis A Jr,Humphries Jeffrey W et al. Adaptation techniques for intrusion detection and intrusion response systems[C].In :Proceedings of the IEEE International Conference on Systems,Man and Cybernetics 4,2000-10.
5Gene H Spafford,Eugene H.The Design and Implementation of Tripwire:A File System Integrity Checker[C].In:Proceedings of the ACM Conference on Computer and Communications Security, 1994-11:18.