共 9 条
[1]
Classification and detection of computer intrusions. Kumar S. . 1995
[2]
Intrusion detection: its role and validation. Liepins G E,Vaccaro H S. Computers and Security . 1992
[3]
Denning D E,An intrusion-detection model. IEEE Transactions on Software Engineering . 1987
[4]
Detectionofanomalouscomputersessionactivity. VaccaroHS,LiepinsGE. http:∥dblp.uni trier.de/db/conf/sp/sp1989.html . 2000
[5]
Naivebayesianclassifier. LachicheN. http:∥www.cs.bris.ac.uk/research/MachineLearning/1BC/ilp99/node2.html . 1999
[6]
Authentication,accesscontrol,andintrusiondetection. RaviS.Sandhu. IEEE Communications Letters . 1994
[7]
Arule basedintrusiondetectionapproach[A]. PorrasPA,KemmererRA. ProceedingsoftheEighthAnnualComputerSecurityApplicationsConference[C] . 1992
[8]
Intrusion detection systems and multisensor data fusion. Bass T. Communications of the ACM . 2000
[9]
Towards a taxonomy of intrusiondetection systems. Debar H,Dacier M. Computer Networks . 1999