[1]HOFMEYR SA, FORREST S, SOMAYAJI A. Intrusion Detection using Sequences of System Calls[J]. Journal of Computer Security, 1998,6(3):151-180.
[2]FORREST S, HOFMEYR SA, SOMAYAJI A, 〖WTBX〗et al.〖WTBZ〗 A sense of self for UNIX processes[A]. Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy[C]. IEEE Press, 1996.
[3]LEE W, STOLFO SJ, CHAN PK. Learning Patterns from Unix Process Execution Traces for Intrusion Detection[A]. Proceedings of the AAAI97 Workshop on AI Approaches to Fraud Detection and Risk Management[C], 1997.
[4]LEE W, STOLFO SJ. Data mining approaches for intrusion detection[A]. Proceedings of the 7th USENIX Security Symposium[C], 1998.
[5]王凤先,常胜,刘振鹏, 等. 一种仿生物免疫的计算机安全系统模型[A]. 2002年全国开放式分布与并行计算学术会议论文集[C]. 武汉:华中科技大学出版社,2002. 72-76.
[6]王凤先,胡陈丽,张岩. 基于系统调用的入侵检测[J]. 计算机工程与应用,2004,40(35):79-81.
[7]戴英侠,连一峰,王航. 系统安全与入侵检测[M]. 北京:清华大学出版社,2002.
[8]徐漫江,曹元大. 一种分析系统调用序列的入侵检测系统设计与实现[J]. 北京理工大学学报,2004,24(4):342-344.