共 31 条
[1]
Abadi Martin, 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P122, DOI 10.1109/RISP.1994.296587
[2]
[Anonymous], P IEEE WORKSH INF AS
[3]
[Anonymous], 1994, CSDTR94013 PURD U
[4]
BAEZAYATES RA, 1989, SIGIR FORUM, V23, P168, DOI 10.1145/75335.75352
[5]
DANIELS T, 1999, J COMPUTER SECURITY, V7
[6]
Denning D. E., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P118
[7]
*GEN ACC OFF, 1996, GAOAIMD9684
[8]
Detecting anomalous and unknown intrusions against programs
[J].
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
1998,
:259-267
[9]
GOREGAOKER S, 2001, TR010703 FLOR STAT U
[10]
HALLIVUORI V, 2001, DENIAL SERVICE ATTAC