共 5 条
[3]
Intrusion detection techniques and approaches
[J].
COMPUTER COMMUNICATIONS,
2002, 25 (15)
:1356-1365
[4]
Intrusion detection using sequences of system calls
[J].
Journal of Computer Security,
1998, 6 (03)
:151-180