共 7 条
[1]
ANDERSON JP, DETECTING UNUSUAL PR
[2]
Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
[4]
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
[5]
Lee W., 2000, ACM Transactions on Information and Systems Security, V3, P227, DOI 10.1145/382912.382914
[6]
TAYLOR C, 2002, P NEW SEC PAR WORKSH, P89
[7]
TERESA L, 1992, REAL TIME INTRUSION, P158