1. Ma Xiaochun. The Research and Application of Data Mining in Network Intrusion Detection System [D]. Xi an: Northwestern Polytechnical University, 2005.
2. Wang; Jie Wang; Jinlei. Distributed Intrusion Detection Technology Application in Networked Control System [J]. Control & Automation 2005,Vol 21,90-92.
3. LU Hui-bin; XU Gang. A New Intrusion Detection Method Based on Data Mining [J]. Microprocessors, 2006, 27(4):58-60.
4. LUO Min ZHANG Huan-Guo WANG Li-Na;. A Survey of Data Mining-Based Intrusion Detection [J]. Computer Science, 2003.02.
5. Li Tian-rui, Pan Wu-ming. Intrusion Detection system based on new association rule mining model [C]. IEEE International Conference on Granular Computering, 2005.