1. Liu Xiangqi, Chong Xiangting, Zhen Chenggang. Intrusion Detection System Based on Data Mining [J]. Information System Engineering , 2013, 04: 44-45,50.
2. Zhao Yanjun, Wei Mingjun. The application of Improved Data Mining Algorithm in Intrusion Detection System [J]. Computer Engineering and Applications , 2013, 18: 69-72,115.
3. Qi Aihua, Song Shucai. The application of data MiningTechnology inComputer Intrusion Detection [J]. Bulletin of Science and Technology , 2013, 10: 19-20,23.
4. Cho S, Pearlman W A. A Full-featured, Error-resilient, Scalable Wavelet Video Codec Based on the Set Partitioning in Hierarchical Trees (SPIHT) Algorithm. IEEE Trans. on CAS for VT, 2002, 12(3): 157-171.
5. Xie QingXiu, Regional Conflict Hot Blind Localization Algorithm Based on Wireless Network [J]. Bulletin of Science and Technology, 2013, 29(12): 97-99.