9Sherif J S.Intrusion detection:the art and the praetice[J].Information Management and Computer Security, 2003,11 (5) : 175-186.
10Sodiya A S,Longe H O D,Akinwale A T.A new two-tiered strategy to intrusion detection[J].Information Management and Computer Security, 2004,12( 1 ) :27-44.