共 15 条
[1]
Anderson J.P., 1980, Computer security threat monitoring and surveillance
[2]
[Anonymous], 1996, P 2 INT C KNOWLEDGE
[3]
Cannady J., 1998, P 1998 NAT INF SYST, P443
[4]
Cestnik B., 1990, P EUR C ART INT, P147
[5]
Fisher D. H., 1987, Machine Learning, V2, P139, DOI 10.1007/BF00114265
[6]
Kononenko I, 1990, CURRENT TREND KNOWLE
[7]
LANGLEY P, 1992, AAAI-92 PROCEEDINGS : TENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, P223
[8]
LASKOV P, 2006, LEARNING INTRUSION D
[9]
A data mining framework for building intrusion detection models
[J].
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
1999,
:120-132
[10]
MUKHERJEE B, 1994, NETWORK INTRUSION DE, P26