Cohen W W. Fast Effective Rule Induction. In: Proc of the 12th International Conference on Machine Learning. Tahoe City, USA, 1995, 115-123
[2]
Hofmeyr S A, Forrest S. Architecture for an Artificial Immune System. Evolutionary Computation, 2000, 8(4): 443-473
[3]
Ghosh A K, Wanken J, Charron F. Detecting Anomalous and Unknown Intrusions against Programs. In: Proc of the Annual Computer Security Applications Conference. Scottsdale, USA, 1998, 259-267
[4]
Ghosh A K, Michael C, Schatz M. A Real-Time Intrusion Detection System Based on Learning Program Behavior. In: Debar H, Mé L, Wu S F, eds. Recent Advances in Intrusion Detection. Heidelberg, Germany: Springer-Verlag, 2000, 93-109
[5]
Lee W, Stolfo S J. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Trans on Information and System Security, 2000, 3(4): 227-261
[6]
Rao X, Dong C X,Yang S Q. An Intrusion Detection System Based on Support Vector Machine. Journal of Software, 2003, 14(4): 798-803 (in Chinese) (饶 鲜,董春曦,杨绍全.基于支撑向量机的入侵检测系统.软件学报, 2003, 14(4): 798-803)
[7]
Zhang Q H, Benveniste A. Wavelet Networks. IEEE Trans on Neural Networks, 1992, 3(6): 889-898
[8]
Zhang Q H. Using Wavelet Network in Nonparametric Estimation. IEEE Trans on Neural Networks, 1997, 8(2): 227-236
[9]
Yao X. Evolving Artificial Neural Networks. Proc of the IEEE, 1999, 87(9): 1423-1447
[10]
Wang L, Pan J, Jiao L C. The Immune Algorithm. Acta Electronica Sinica, 2000, 28(7): 74-78 (in Chinese) (王 磊,潘 进,焦李成.免疫算法.电子学报, 2000, 28(7): 74-78)
[11]
Wang L, Pan J, Jiao L C. The Evolutional Algorithm Based on the Immune Strategy. Progress in Natural Science, 2000, 10(5): 451-455(in Chinese) (王 磊,潘 进,焦李成.基于免疫策略的进化算法.自然科学进展, 2000, 10(5): 451-455)
[12]
Su P R, Li D Q, Feng D G. A Host-Based Anomaly Intrusion Detection Model Based on Genetic Programming. Journal of Software, 2003, 14(6): 1120-1126 (in Chinese) (苏璞睿,李德全,冯登国.基于基因规划的主机异常入侵检测模型.软件学报, 2003, 14(6): 1120-1126)
[13]
Warrender C, Forrest S, Pearlmutter B A. Detecting Intrusions Using System Calls: Alternative Data Models. In: Proc of the IEEE Symposium on Security and Privacy. Oakland, USA, 1999, 133-145