赵小林, 彭祖林, 王亚彬. 网络安全技术教程. 北京: 国防工业出版社, 2002-1, 245-245.[2]蒋建春, 马恒太, 任党恩, 等. 网络安全入侵检测: 研究综述. 软件学报, 2000, 11(11): 1460-1466.[3]Fumio Mizoguchi. Anomaly Detection Using Visualization and Machine Learning. IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Gaithersburg, Maryland: March 14-16, 2000: 165-170.[4]Shan Zheng, Chen Peng, Xu Ke, et al.. A Network State Based Intrusion Detection Model. 2001 International Conference on Computer Networks and Mobile Computing. Beijing, CHINA: October 16 -19, 2001: 481-486.[5]蒋建春, 冯登国. 网络入侵检测原理与技术. 北京: 国防工业出版社, 2001-7, 39-39.[6]李小秋, 孙学涛, 谢余强, 等. 入侵检测系统中的快速多模式匹配算法. 计算机应用与软件, 2004-02, 21(2): 84-86.[7]Koral Ilgun, Richard A.Kemmerer, Phillip A.Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. on Software Engineering, 1995-3, 21(3): 181-199.[8]Nittida Nuansri, Samar Singh, Tharam S.Dillon. A Process State-Transition Analysis and its Application to Intrusion Detection. 15th Annual Computer Security Applications Conference. Phoenix, Arizona:December 06-10, 1999: 378-387.[9]Nong Ye, Syed Masum Emran, Xiangyang Li, et al.. Statistical Process Control for Computer Intrusion Detection[J].DARPA Information Survivability Conference Exposition Anaheim, California: June 12-1.2001, 1(1):3-
|