趙小林, 彭祖林, 王亞彬. 網(wǎng)絡安全技術教程. 北京: 國防工業(yè)出版社, 2002-1, 245-245.[2]蔣建春, 馬恒太, 任黨恩, 等. 網(wǎng)絡安全入侵檢測: 研究綜述. 軟件學報, 2000, 11(11): 1460-1466.[3]Fumio Mizoguchi. Anomaly Detection Using Visualization and Machine Learning. IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Gaithersburg, Maryland: March 14-16, 2000: 165-170.[4]Shan Zheng, Chen Peng, Xu Ke, et al.. A Network State Based Intrusion Detection Model. 2001 International Conference on Computer Networks and Mobile Computing. Beijing, CHINA: October 16 -19, 2001: 481-486.[5]蔣建春, 馮登國. 網(wǎng)絡入侵檢測原理與技術. 北京: 國防工業(yè)出版社, 2001-7, 39-39.[6]李小秋, 孫學濤, 謝余強, 等. 入侵檢測系統(tǒng)中的快速多模式匹配算法. 計算機應用與軟件, 2004-02, 21(2): 84-86.[7]Koral Ilgun, Richard A.Kemmerer, Phillip A.Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. on Software Engineering, 1995-3, 21(3): 181-199.[8]Nittida Nuansri, Samar Singh, Tharam S.Dillon. A Process State-Transition Analysis and its Application to Intrusion Detection. 15th Annual Computer Security Applications Conference. Phoenix, Arizona:December 06-10, 1999: 378-387.[9]Nong Ye, Syed Masum Emran, Xiangyang Li, et al.. Statistical Process Control for Computer Intrusion Detection[J].DARPA Information Survivability Conference Exposition Anaheim, California: June 12-1.2001, 1(1):3-
|