References
- S.Kumar and E.Spafford, 'A pattern matching model for misuse intrusion detection.' Seventeenth National Computer Security Conference, Baltimore, MD, October 1994, 11-21
- S.Stolfo, A.Prodromidis, S. Tselepis, W. Lee, 'Java Agents for Meta learning over Distributed Databases', in AAAI97 workshop on AI Methods in Fraud and Risk Management 1996
- Neil Crowe and Sandra Schiavo, 'An Intelligent Tutor for Intrusion Detection on Computer System', code Cs/rp, Department of Computer Science, Naval postgraduate school monterey, 1997
- Sandeep Kumar, gene Spafford. 'A Pattern Matching Model for Misuse Intrusion Detection', Proceedings of the 17th National Computer Security Conference, October 1994
- T. lane and C. E. Brodley. 'Detecting the abnormal: Machine learning in computer security', Technical Report TR-ECE 97-1, Prudue University, West Lafayette, IN, 1997
- Jai Sundar B. Spafford E, 'Software Agents for Intrusion Detection,' Technical Report, Purdue University, Department of Computer Science, 1997
- Crosbie M, Spafford E, 'Defending a Computer System using Autonomous Agents,' Technical Report, Purdue University, Department of Computer Science, 1996
- 은유진, 박정호, '침입 탐지 기술 분류 및 기술적 구성요소', 정보보호센터 정보보호 뉴스 1998.7 통권 13호
- '정보시스템 침해사고 방지기술 개발에 관한 연구', 정보보호센터,1999.1
- 정종근 외 4인, '데이터 마이닝 기법을 적용한 최적 침입 탐지 모듈 설계', 1999 춘계 정보과학회 논문집