4Edward P G, Jhordany R G P, Rafael V PM. Improving network intrusion detection with extended KDD features [A]. IAENG Transactions on Engineering Technologies[C]. 2014, 247: 431-445.
5Liu J, Chen H, Zhong Z, et al. Intrusion detection algorithm for the wormhole attack in Ad Hoc network [A]. Proceedings of In- ternational Conference on Computer Science and Information Tech- nology Advances in Intelligent Systems and Computing [C]. 2014, 255: 147-154.
6Kumar R M. Intrusion detection and prevention technology using sensor networks to protect Iirewall from attacks [J]. Automation and Autonomous System, 2013, 5 (6): 215-272.
7Steven D Young, Denise R Jones. Runway incursion andPreven- tion: A Technology. Solution[ C]. Athens, the International Federation of Airworthiness' 31st International Conference, 2001.
8Radu I Siminiceanu, Gianfranco Ciardo. Formal Verificationof the NASA Runway Safety Monitor[ J]. International Journal on Soft- ware Tools for Technology. 2007-9:63-76.
9David F Green Jr. Runway Safety Monitor Algorithm forRunway In- cursion Detection and Alerting[R]. NASA/CR-2002-211416, Virginia, NASA, 2001.
10N Ohta. A statistical approach to background subtraction for sur- veillance systems [ J ]. International Cunfereneeun Computer Vi- sion, 2001-2:481-486.