共 22 条
[2]
Balasubramaniyan J. S., 1996, 9805 CERIAS
[3]
Barika F. A., 2009, Journal of Software, V4, P495
[4]
Boughaci D., 2007, P 2007 EUR C TEL INF, P12
[5]
Brahmi I, 2010, LECT NOTES COMPUT SC, V6122, P73, DOI 10.1007/978-3-642-13601-6_9
[6]
Crosbie M., 1995, CSDTR95008 PURD U
[8]
Dastjerdi A. V., 2008, P WORLD ACAD SCI ENG, V35
[9]
Deepa A. J., 2015, International Journal of Enterprise Network Management, V6, P275
[10]
AN INTRUSION-DETECTION MODEL
[J].
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1987, 13 (02)
:222-232