1. Warrender C, Forrest S, Pearlmutter B. Detecting Intrusions Using System Calls: Alternative Data Models [C].//Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland: IEEE Press, 1999: 133–145.
2. Rapaka A, Novokhodko A, Wunsch D. Intrusion Detection Using Radial Basis Function Network on Sequences of System Calls [C]//International Joint Conference on Neural Networks, Portland, July 20–24, 2003.
3. Lam K Y, Hui L, Chung S L. Data Reduction Method for Intrusion Detection [J].Journal of Systems and Software, 1996,33(1): 101–108.
4. Proceedings of the IASTED International Conference on Artificial Intelligence and Applications;Y B Reddy,2004
5. Hoang X D, Hu J. An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls [C]//12th IEEE International Conference on Networks, Singapore, Nov. 16–19, 2004.