2[1]Lee W, Stolfo S J, Mok K. Data mining in work flow environments: experiences in intrusion detection. In: Proceedings of 1999 Conference on Knowledge Discovery and Data Mining(KDD-99), 1999
3[2]Warrender C, Forrest S, Pearlmutter B. Detecting intrsions using system calls: alternative data models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society, 1999. 135
4[3]Li T. An intelligent neural network programming system(NNPS). ACM SIGPLAN Notices, 2000, 35(3)