1. [1] Y. Qu, Software behaviouristics, Electronic Industry Publishers, China, 2004.
2. [2] S.A. Hofmeyr, S. Forrest, and A. Somayaji, “Intrusion detection using sequences of system calls,” Journal of Computer Security, vol.6, pp.151-180, 1998.
3. [3] Y. Liao and V.R. Vemuri, “Use of k-nearest neighbour classifier for intrusion detection,” Computers & Security, vol.21, no.5, pp.439-448, 2002.
4. [4] D. Wanger and D. Dean, “Intrusion detection via static analysis,” Proc. IEEE Symposium on Security and Privacy, pp.156-168, 2001.
5. [5] Q. Yin, R. Zhang, X. Li, and H. Wang, “Research on Technology of Intrusion Detection Based on Dynamic Markov Model,” Electronic Sinica, vol.32, no.11, pp.1785-1788, 2004.