共 20 条
[1]
AKHAVAN S, 1998, P 6 INT C FUZZ THEOR, P96
[2]
AMOROSO EG, 1999, INTRUSION DETECTION
[3]
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[4]
Towards a taxonomy of intrusion-detection systems
[J].
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING,
1999, 31 (08)
:805-822
[6]
Lane T., 1998, 5th ACM Conference on Computer and Communications Security, P150, DOI 10.1145/288090.288122
[7]
Lippmann R, 2000, P DARPA INF SURV C E, V2, P12, DOI DOI 10.1109/DISCEX.2000.821506
[8]
LUNT TF, 1990, ANN COMP SEC APPL C, P273
[9]
MARSAGLIA G, 1984, COMPUTER SCI STAT, P3