|
[1] J. P. Anderson. Computer Security Threat Monitoring and Surveillance. Technical report, James P Anderson Co., For Washington, Pennsylvania, April 1980.[2] Midori ASAKA, Takefumi ONABUTA, Tadashi INOUE, Shunji OKAZAWA and Shigeki GOTO “A New Intrusion Detection Method Based on Discriminant Analysis.” IEICE TRANS.INF.&SYST.,VOL.E84-D,NO.5 MAY 2001.[3] Rebecca Gurley Bace “Intrusion Detection “ Pearson Higher Education Published; ISBN: 1578701856; 1st edition December 21, 1999.[4] Christina Yip Chung, Michael Gertz and Karl Levitt “DEMIDS: A Misuse Detection System for Database Systems” IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, 1999.[5] J. E. Dickerson and J. A. Dickerson, “Fuzzy Network Profiling for Intrusion Detection,” in Proc. of Fuzzy Information Processing Society, 2000.[6] Terry Escamalla, “Intrusion Detection : Network Security beyond the firewall”, John Wiley and Sons Inc, New York, USA, 1998.[7] Susan C. Lee and David V. Heinbuch ”Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks” IEEE TRANSACTIONS ON SYSTEMS. MAN, AND CYBERNETICS-PART A:SYSTEMS AND HUMANS.VOL 31, NO.4, JULY 2001.[8] R. Heady, G. Luger, A. Maccabe, and M. Servilla. The Architecture of a Network Level Intrusion Detection System. Technical report, Department of Computer Science, University of New Mexico, Auguest 1990.[9] S. Jha ,K. Tan, and R.A. Maxion “Markov Chains, Classifiers, and Intrusion Detection” IEEE Symposium on Security and privacy May 13-16, 2001.[10] J. Kim and P.Bentley “Negative Selection within an Artificial Immune System for Network Intrusion Detection”, the 14th Annial Fall Symposium of the Korean Information Processing Society, Seoul,Korea 2000.[11] Wenke Lee. Sal Stolfo and Kui Mok. “A Data Mining Framework for Building Intrusion Detection Models.” IEEE Symposium on Security and Privacy,1999.[12] Wenke Lee. Sal Stolfo and Philip K. Chan “Real Time Data Mining-based Intrusion Detection” IEEE Symposium on Security and Privacy, 2001.[13] Matthew G.Schultz , Eleazar Eskin and Erez Zadok “Data Mining Methods for Detection of New Malicious Executables.” IEEE Symposium on Security and Privacy,1Oakland CA, May 2001.[14] Biges. S. and R. Vaughn. “Intrusion detection via fuzzy data mining.” In proceedings of the 12th annual Canadian information technology security symposium held in Ottawa, June, 2000, by Communications Security Establishment, 111 — 121.[15] R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni “A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors” IEEE Symposium on Security and privacy May 13-16, 2001.[16] 黃曼玲 “資料倉儲系統中實體化視域選取之研究” 逢甲大學資訊工程學系碩士班碩士論文,2001年6月.
|