共 7 条
[1]
[2]
[3]
[4]
基于主机的入侵检测方法研究[D] 田新广 国防科学技术大学 2005,
[5]
An Empirical Study of Two Approaches to Sequence Learning for Anomaly Detection.[J] Terran Lane;Carla E. Brodley Machine Learning 2003,
[6]
Intrusion detection techniques and approaches[J] Theuns Verwoerd;Ray Hunt Computer Communications 2002,
[7]
Computer immunology[J] Stephanie Forrest;Steven A. Hofmeyr;Anil Somayaji Communications of the ACM 1997,

