共 6 条
[1]
Detecting intrusions using system calls:Alternative data models. WarrenderC,ForresrS,PearlmutterB. Proceedings of the1999IEEE Symposium onSecurity andPrivacy . 1999
[2]
The Nature of Statistical Learning Theory. Vapnik,V.N. . 1995
[3]
A data mining framework for building intrusion detection model. LeeW,StolfoSJ. Proceedings of the1999IEEE Symposium onSecurity andPrivacy . 1999
[4]
AReal-time Intrusion Detection SystemBased on Learning ProgramBehavior. Ghosh AK,Michael C,Schatz M. .Recent Advances in Intrusion Detection(RAID2000) . 2000
[5]
Self_Nonself discrimination in a computer. ForrestS,PerrelasonAS,AllenL,CherukurR. Proceedings of the1994IEEE Symposium onResearch inSecurity andPrivacy . 1994
[6]
Information-Theoretic measures for anomaly detection. Lee W,Dong X. Proc.of the 2001 IEEE Symp.on Security and Privacy . 2001