共 9 条
- [1] LIPPMANN RP, 2000, P DARPA INF SURV C E, V2, P1012
- [2] Marchette D, 1999, PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), P119
- [3] MARCHETTE DJ, 2001, COMPUTER INTRUSION D
- [4] McHugh J., 2000, ACM Transactions on Information and Systems Security, V3, P262, DOI 10.1145/382912.382923
- [5] McHugh J, 2000, LECT NOTES COMPUT SC, V1907, P145
- [6] *MIT LINC LAB, DARPA INTR DET EV
- [7] Ning Peng, 2002, P 9 ACM C COMP COMM, P245, DOI DOI 10.1145/586110.586144
- [8] Sekar R., 2002, P 9 ACM C COMPUTER C, P265, DOI DOI 10.1145/586110.586146
- [9] Uppuluri P., 2001, International Workshop on Recent Advances in Intrusion Detection, V2212, P172