4Anderson J P. James P. Anderson Co Computer security threatmonitoring and surveillance[J]. 1980.
5Dorothy E Denning. An intrusion-detection model[J]. 1987(2).
6ZHAN Jiuhua. Intrusion Detection System Based on Data Mining [C]. In Proceedings of IEEE First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008),2008.