Lee W, Miller M, Stolfo S, et al. Toward cost-sensitive modeling for intrusion detection[M]. Technical Report CUCS-035-99,Computer Science Department Columbia University, 1999.
[2]
Cohen F B. Simulating cyber attacks, defenses, and consequences[J/OL].
[3]
王万森. 人工智能原理及其应用[M]. 北京:电子工业出版社, 2000.
[4]
Hughes T J. Sensor fusion in a military avionics environment[J]. Measurement and Control, 1989, 24(2):203-205.
[5]
Curry D, Debar H. Intrusion detection message exchange format data model and extensible markup language (XML) document type definition[J]. IETF Network Working Group, 2001,9(3):28.
[6]
Guo Daifei, Yang Yixian, Hu zhengming. Design of a secure distributedintrusion detection system[J]. Journal of CHUPT, 2002, 9(6): 17-24.