共 8 条
[1]
A new intrusion detection method based on discriminant analysis. Asaka M,Onabuta T,Inoue T,Okazawa S,Goto S. IEICE Transactions on Information and Systems . 2001
[2]
Rough Sets-Theoretical Aspect of Reasoning about Data. Pawlak Z. . 1991
[3]
Minimal approximate hitting sets and rule templates. Vinterbo S,hrn A. International Journal of Approximate Reasoning . 2000
[4]
Intrusion Detection. Bace R. . 2000
[5]
A sense of self for Unix processes. Forrest S,Hofmeyr S A et al. In:Proceedings of 1996 IEEE Symposium on Computer Security and Privacy . 1996
[6]
Intrusiondetectionusingvariable lengthaudittrailpatterns. WespiA,DacierMetal. Proceedingsofthe3rdInternationalWorkshopontheRecentAdvancesinIntrusionDetection (RAID’’2000) . 2000
[7]
Fast effective rule induction. Cohen W W. In: Proceedings of the 12th International Conference, Lake Taho, California . 1995
[8]
Learning patterns from Unix process execution traces for intrusion detection. Lee W,Stolfo S,Chan P. In: Proceedings of AAAI Workshop: AI Approaches to Fraud Detection and Risk Management . 1997