共 9 条
- [1] Haystack: An intrusion detection system. Smaha S E. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference . 1988
- [2] Applying genetic programming to Intrusion detection. Crosbie M,,Spafford G. . 1997
- [3] The architecture of a network level intrusion detection system. Richard H,George L,Arthur M,et al. Department of Computer Science, University of New Mexico . 1990
- [4] Computer Security Threat Monitoring and Surveillance. J.P Anderson. . 1980
- [5] Discovery: an expert system in the commercial data security environment. Tener W T. . 1986
- [6] IDES:The enhanced prototype, a real-time intrusion detection system. Teresa L,Jagannathan R,Lee R et al. . 1988
- [7] An Intrusion Detection Model. Dorothy E Denning. IEEE Transactions on Software Engineering . 1987
- [8] Detection of anomalous computer session activity. Vaccaro H S,Liepins G E. . 1989
- [9] Expert system in intrusion detection:a case study. Sebring M M,Shellhouse E,Hanna M E,et al. . 1988