共 31 条
[11]
*CERT CC, 1988, CERT COORD CTR
[13]
Ilgun K., 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.93CH3290-4), P16, DOI 10.1109/RISP.1993.287646
[14]
Jiawei Han, 2000, SIGMOD Record, V29, P1, DOI 10.1145/335191.335372
[15]
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[16]
A data mining framework for building intrusion detection models
[J].
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
1999,
:120-132
[17]
LEE W, 2000, ADAPTIVE INTRUSION D, P533
[18]
LEE W, 2001, IEEE 2 DARPA INF SUR, P185
[19]
Lee W., 1999, P 5 ACM SIGKDD INT C, DOI DOI 10.1145/312129.312212
[20]
Lent B., 1997, Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, P227