8Charles P Pfleeger.信息安全原理与应用[M].第四版.李毅超,等译.北京:电子工业出版社,2007.
9Verwoerd T, Hunt R. Intrusion Detection Techniques and Approaches[J]. Computer Communications, 2002, 25(15) : 1 356-1 365.
10Cunningham R , Lippmann R. Improving intrusion detection performance using keyword selection detection performance using key2 word selection and neural networks[J]. Computer Networks ,2000, (34):597-603.