共 14 条
[1]
Anderson James P., 1980, Computer Security Threat Monitoring and Surveillance
[3]
Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
[5]
Intrusion detection applying machine learning to Solaris audit data
[J].
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
1998,
:268-279
[7]
Lane T., 1999, ACM Transactions on Information and System Security, V2, P295
[8]
LAROSA C, 2008, SAC 2008, P880
[9]
LEE W, 1998, P 7 USENIX SEC S SEC
[10]
MacQueen J., 1967, 5 BERK S MATH STAT P, P281