1. Hou, F.-m., Li, D.-x.: Design of a New Intrusion Detection SystemBased on Protocol Tree. J. Application Research of Computer, 150–152 (2005)
2. Verwoerd, T.: Intrusion Detection Techniques and Approaches. J. Computer Communications 25, 1356–1365 (2002)
3. Cheng, Y.-q., Mei, D.-h., Chen, L.-f.: A Model of Intrusion Detection System Based on Data Mining. J. Computer Technology and Development 19(12) (2009)
4. Jiang, J.-c., Ma, H.-t., Ren, D.-e., Qing, S.-h.: A Survey of Intrusion Detection Research on Network Security. Journal of Software, 1460–1466 (2000)
5. Tang, Z-j., Li, J-h.: Intrusion Detection. Tsinghua University Press, Beijing (2004)