共 44 条
[1]
Anderson J. P., 1999, COMPUTER SECURITY TH
[2]
[Anonymous], P IEEE C GLOB TEL
[3]
[Anonymous], 1999, A Wavelet Tour of Signal Processing
[4]
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[5]
Barford P, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P71, DOI 10.1145/637201.637210
[6]
Barreno Marco, 2006, P 2006 ACM S INF COM, P16
[7]
CERT Coordination Center, 2000, DOS DEV ADV CA 2000
[8]
CERT Coordination Center, 1999, DEN OF SERV TOOLS AD
[9]
MAXIMUM LIKELIHOOD FROM INCOMPLETE DATA VIA EM ALGORITHM
[J].
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-METHODOLOGICAL,
1977, 39 (01)
:1-38
[10]
AN INTRUSION-DETECTION MODEL
[J].
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
1987, 13 (02)
:222-232