4Arnes A, Valeur F, Vigna G, et al. Using hidden markov models to evaluate the risks of intrusions//Proceedings of the Recent Advances in Intrusion Detection. Hamburg, Germany, 2006.. 145-164.
5Haslum K, Moe M E G, Knapskog S J. Real-time intrusion prevention and security analysis of networks using HMMs// Proceedings of the 33rd IEEE Conference on Local Computer Networks. Montreal, Canada 2008.. 927-934.
6Khreich W, Granger E, Miri A, et al. Adaptive ROC-based ensembles of HMMs applied to anomaly detection. Pattern Recognition, 2012, 45(1).. 208-230.
7Rabiner L R. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 1989, 77(2): 257-286.
8Arnes A, Sallhammar K, Haslum K, et al. Real-time risk assessment with network sensors and intrusion detection systems. Computational Intelligence and Security, 2005, 3802 : 388-397.
9Jonsson E, Olovsson T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transac- tions on So:ltware Engineering, 1997, 23(4): 235-245.
10Sendi A S, Dagenais M, Jabbarifar M, Couture M. Real time intrusion prediction based on optimized Alerts with Hidden Markov Model. Journal of Networks, 2012, 7(2): 311-321.