共 18 条
[1]
Amor N.B., 2004, P 2004 ACM S APPL CO, P420, DOI DOI 10.1145/967900.967989
[2]
[Anonymous], 1999, KDD DAT SET
[3]
[Anonymous], P 1998 NAT INF SYST
[4]
[Anonymous], PATTERN RECOGNITION
[5]
CUNNINGHAM R, 1999, P INT S REC ADV INTR
[6]
CURT L, 1994, NEUROSOLUTIONS VERSI
[7]
Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
[8]
Faraoun K.M., 2007, INT J COMPUT INTELL, V3, P161
[9]
Detecting anomalous and unknown intrusions against programs
[J].
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
1998,
:259-267
[10]
GHOSH AK, 1999, P 8 USENIX SEC S