참고문헌
- Technical Report Computer security threat monitoring and surveillance Anderson J.P.
- In Proceedings of the 18th NISSC Conference Defending a Computer System using Autonomous Agents Crosbie M.;Spafford G.
- IEEE Trans. Software Engineering an Intrusion Detection Model Denning D.E.;IDES
- In Proceedings of the 1996 IEEE Symposium of Security and Privacy A Sense of Self for Unix Proccesses Forrest S.;Hofmeyr S.A.;Somayaji A.;Longstaff T.A.
- Technical Report A Neural Network Approach Towards Intrusion Detection Fox K.L.;Henning R.R.;Reed J.H.;Simonian R.P.
- NSA URP MDA904-93-C-4085 Artificial Intelligence and Instrusion Detection : Current and Future Directions Frank J.
- Genetic Algorithm in Search, Optimization and Machine Learning Goldberg D.
- Technical Report The architecture of a network level intrusion detection system Heady R.;Luger G.;Maccabe A.;Servilla M.
- A Biologically Inspired Immune System for Computers. Kephart J.O.
- In Proceedings of the 17th National Computer Secutiry Conference A Pattern Matching model for Misuse Intrusion Detection Kumar S.;Spafford G.
- In Proceedings of Workshop on Future Detections in Computer Misuse and Anomaly Machine-Learning in intrusion and misuse detection Laird, P.
- National Info-Sec Technical Baseline - Intrusion Detection and Response Lawrence Livermore National Lab.;Sandia National Lab.
- In Proceedings of the ISOC'97 Symposium on Network and Distributed System Security Continuous Assessment of a Unix Configuration : Integrating Intrusion Detection
- In Proceedings of the ISOC'95 Symposium on Network and Distributed System Security Distributed Audit Trail Analysis
- SAFEGUARD Final Report : Detecting Unusual Program Behavior Using the NIDES Statistical Anderson, Valdes