4[1]Julisch K.Data mining for intrusion detection:A critical review.IBM Research,Zurich Research Laboratory
5[2]El-Sayed M,Ruiz C,Rundensteiner E A.FSMiner:efficient and incremental mining of frequent sequence patterns in Web logs.ACM WIDM'04,Washington DC,November 2004:12-13
6[3]Lee W,Stolfo S,J Mok K W.Data mining approaches for intrusion detection.Proceedings of the 7th USENIX Security Symposium,1998
7[4]Cai Y,Clutter D,Pape G,et al.MAIDS:mining alarming incidents from Data Streams.ACM-SIGMOD Int Conf Management of Data(SIGMOD04),New York:ACM Press,2004,919-920
8[5]Chatzigiannakis V,Androulidakis,G,Maglaris B.A distributed intrusion detection prototype using security agents.HP OpenView University Association,2004
9[6]Kumar S,Spafford.E H.A pattem MatChing model for misuse intrusion detection.Proceedings of the 17th National computer Security Conference,1994
10[7]Boyer R,Moore J S.A fast string searching algorithm.Communication of the ACM,1971; 20(10):762-772