共 35 条
[1]
Arce I., Levy E., An analysis of the Slapper worm, Security and Privacy Magazine, IEEE, 1, pp. 82-87, (2003)
[2]
Bailey M., Cooke E., Watson D., Jahanian F., Provos N., A Hybrid Honeypot Architecture for Scalable Network Monitoring, Technical Report CSE-TR, pp. 499-504, (2004)
[3]
Dokas P., Ertoz L., Kumar V., Lazarevic A., Srivastava J., Tan P., Data mining for network intrusion detection, Proceedings of NSF Workshop on Next Generation Data Mining, (2002)
[4]
Duda R., Hart P., Pattern Classification and Scene Analysis, (1973)
[5]
Eskin E., Arnold A., Prerau M., Portnoy L., Stolfo S., A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data, Applications of Data Mining in Computer Security, (2002)
[6]
Gomez J., Gonzalez F., Dasgupta D., An immuno-fuzzy approach to anomaly detection, The 12th IEEE International Conference on Fuzzy Systems, 2, pp. 1219-1224, (2003)
[7]
Guan Y., Ghorbani A., Belacel N., Y-means: A clustering method for intrusion detection, Proceeding of IEEE Canadian Conference on Electrical and Computer Engineering, 2, pp. 1083-1086, (2003)
[8]
Hertel C., Implementing Cifs: The Common Internet File System, (2003)
[9]
World Wide Web, (2006)
[10]
IDSeval, World Wide Web, (1998)