共 15 条
- [11] Siponen M. T., 2007, Data Base for Advances in Information Systems, V38, P60, DOI 10.1145/1216218.1216224
- [12] Snort, SNORT NETW BAS INTR
- [13] Tombini E., 2004, Proceedings. 20th Annual Computer Security Applications Conference, P428
- [14] Ye Du, 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788), P4348, DOI 10.1109/WCICA.2004.1342334
- [15] Probabilistic techniques for intrusion detection based on computer audit data [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 266 - 274