参考文献/References:
[ 1] 刘次华. 随机过程[M ]. 2版. 武汉: 华中科技大学出版社, 2001: 42- 43.
Liu C ihua. Stochastic Processes [M ]. 2nd ed. Wuhan: H uaZhong University o f Sc ience and Techno logy Press, 2001: 42 -43. ( in Chinese)
[ 2] W a rrender C, Fo rrest S, Pearlmutter B. De tecting intrus ions us ing system ca lls: alte rna tive da tam ode ls[ C] / / Proc the 1999 IEEE Sym po sium on Secur ity and Privacy. B erkely, Ca liforn ia, USA: IEEE Compu ter Soc iety, 1999: 133- 145.
[ 3] LaneT. M achine Lea rning techn iques fo r the compu ter security dom ain of anoma ly detection[ D] . W est Lafayette: PurdueUn-i ve rsity, 2000.
[ 4] 尹清波, 张汝波, 李雪耀, 等. 基于线性预测与马尔可夫模型的入侵检测技术研究[ J] . 计算机学报, 2005, 28( 5): 900- 907.
Y in Q ingbo, Zhang Rubo, L iXueyao, e t a.l Research on techno logy of intrus ion detection based on linea r prediction and m arkov m ode l[ J] . Ch inese Journa l o f Computers, 2005, 28( 5): 900- 907. ( in Chinese)
[ 5] Rab ine r L, Juang B. Fundam enta ls of Speech Recogn ition[M ]. New Jersey: Pren tice-H a ll Internationa l Inc, 1993.
[ 6] 孙宏伟, 田新广, 邹涛, 等. 基于隐马尔可夫模型的IDS程序行为异常检测[ J]. 国防科技大学学报, 2003, 25( 5): 63- 67.
Sun H ongw e,i T ian X inguang, Zou Tao, et a .l Anom a ly detection o f the prog ram behav iors fo r IDS based on h iddenM arkov m ode ls [ J]. Journal o fN ationalUn iv ers ity o f Defense Techno logy, 2003, 25( 5): 63- 67. ( in Ch inese)
[ 7] Fo rrest S, H o fm eyr S A, Somaya jiA, et a.l A sense of se lf fo rUN IX processes[ C] / / Proceed ing s o f the 1996 IEEE Sympos-i um on Security and Pr ivacy. Oakland, Ca lifo rn ia, 1996: 120- 128.
[ 8] S imon H aykin. Neural Netwo rks: A Comprehensive Foundation [M ]. 2nd ed. New Jersey: Prentice-H a ll Internationa l Inc, 1999.
[ 9] ThottanM, Ji C. Adaptive thresho ld ing for proactiv e netwo rk prob lem detec tion[ C] / / Proceed ings of the Third IEEE InternationalW orkshop on System sM anagem ent. New po rt, Rhode Island, 1998: 108- 116.