共 10 条
[1]
Jiang Jianchun,Ma Hengtai,Ren Dangen,et al.Asurvey of intrusion detection research on network security. Journal of Soft ware . 2000
[2]
Chen Bo,Han Hong,Lun Xian-liang,et al.Asecurity defense systemframework. Mini Micro Systems . 2003
[3]
Dennis J,Ingram H,Steven K.Distributed intrusion de-tection for computer system,using communicating agents. . 2000
[4]
Steven A H.Ani mmunological model of distributed detec-tion andits applicationto computer security. . 1999
[5]
Heady R,Luger G,Hof meyr A,et al.Computer i m-munology. Communications of the ACM . 1997
[6]
Ludovic Me,Gassata.Agenetic algorithmas an alternative tool for security audit trails analysis. . 1996
[7]
Deng Julong.Grey forecast and grey decision. . 2002
[8]
Intrusion Detection Systems[C]. Liu Guiguo ITS Engineering&Technology Research Institute of Highway Ministry of Transport Beijing ,China.2011 3rd IEEE International Conference on Information Management and Engineering(ICIME 2011),1600
[9]
Susan C L,David V H.Training a neural-network basedintrusion detector. IEEE Trans.System and Humans . 2001
[10]
Roy A M,Ki mie M C,Tan Benchmarking.Anomaly-based detection systems. . 2000