共 22 条
[1]
ABEDIN M, 2006, QOP 06 P 2 ACM WORKS
[2]
[Anonymous], FUZZY LOGIC TOOLBOX
[3]
[Anonymous], FALSE POSITIVES USER
[4]
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[5]
Cuppens F, 2000, LECT NOTES COMPUT SC, V1907, P197
[6]
Curry D., 2007, INTRUSION DETECTION
[7]
Towards a taxonomy of intrusion-detection systems
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
1999, 31 (08)
:805-822
[8]
Debar H., 2001, RECENT ADV INTRUSION
[9]
Feinstein B., 2007, INTRUSION DETECTION
[10]
JULISCH K, 2003, CLUSTERING INTRUSION