1. Forrest, S., Hofmeyr, S.A., Somayaji, A.: A sense of self for unix processes. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120–128 (1996)
2. Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Usenix security (1998)
3. Wespi, A., Dacier, M., Debar, H.: Intrusion detection using variable-length audit trail patterns. In: International Workshop on Recent Advances in Intrusion Detection, pp. 110–129. Springer, Heidelberg, October 2000
4. Tao, F., Yin, Z.Y., Fu, J.M.: Software behavior model based on system calls. Comput. Sci. 37(4), 151–157 (2010)
5. Fu, J.M., Tao, F., Wang, D.: Software behavior model based on system objects. Ruanjian Xuebao/J. Soft. 22(11), 2716–2728 (2011)