[1]
MCGRAW G,MORR ISETT G . Attacking malicious code: a report to the infosec research council[ J ]. I EEE Soft wa re , 2000, 17 (5) : 33241 .
DOI: 10.1109/52.877857
Google Scholar
[2]
LEEW, STOLFO S J,MOK KW. A data mining framework for building intrusi on detection models[ C ] / /Proc of IEEE Security and Privacy . 1999: 1202 132.
Google Scholar
[3]
JON H, PASCAL M. Can s ource code auditing s oft ware identify com2mon vulnerabilities and be used to evaluate s oft ware security [ C ] / /Proc of the 37 th Annual Hawaii I nternati onal Conference on System Sciences . 2004: 440524414.
DOI: 10.1109/hicss.2004.1265654
Google Scholar
[4]
Mahoney M V, Chan P K. An analysis of t he 1999 DARPAΠ Lincoln Laboratory evaluation data for network anomaly detection [ C] Π Π Proc of t he 6t h Int Symp on Recent Advances in Int rusion Detection. Berlin : Springer , 2003 : 2202237
DOI: 10.1007/978-3-540-45248-5_13
Google Scholar
[5]
Yatagai T , Isohara T , Sasase I. Detection of HTTP2GET flood at tack based on analysis of page access behavior [ C] Π Π Proc of 2007 IEEE Pacific Rim Conf on Communications ,Computers and Signal Processing. Piscataway , NJ : IEEE ,2007 : 2322235
DOI: 10.1109/pacrim.2007.4313218
Google Scholar
[6]
Wang K, Stolfo S J . Anomalous payload2based networkint rusion detection [ C] Π Π Proc of t he 7t h Int Symp on Recent Advances in Int rusion Detection. Berlin : Springer , 2004 :2032222
Google Scholar
[7]
Yu S Z , Kobayashi H. An efficient forward2backward lgorit hm for an explicit2duration hidden Markov model [J ] .IEEE Signal Processing Let ters , 2003 , 10 (1) : 11214
Google Scholar