[1] 中国互联网络信息中心. 第33次中国互联网络发展状况统计报告[OL]. http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201401/P020140116395418429515.pdf, 2014-01. [2] 朱明. 数据挖掘[M]. 合肥:中国科学技术大学出版社,2002. [3] 连一峰,戴英侠,王航. 基于模式挖掘的用户行为异常检测[J]. 计算机学报,2002,25(03):325-330. [4] Donoho S. Early detection of insider trading in option markets[C] Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2004. 420-429. [5] Otey M E, Ghoting A, Parthasarathy S. Fast distributed outlier detection in mixed-attribute data sets[J]. Data Mining and Knowledge Discovery, 2006, 12(2-3): 203-228. [6] Agrawal R, Srikant R. Fast algorithms for mining association rules[C] Proc. 20th int. conf. very large data bases, VLDB. 1994, 1215: 487-499. [7] Lee W, Stolfo S J. A framework for constructing features and models for intrusion detection systems[J]. ACM transactions on Information and system security (TiSSEC), 2000, 3(4): 227-261. [8] 江伟,陈龙,王国胤. 用户行为异常检测在安全审计系统中的应用[J]. 计算机应用,2006,26(07):1637-1639. [9] 张晓慧,林柏钢. 基于特征选择和多分类支持向量机的异常检测[J]. 通信学报,2009,30(10A):68-73. [10] 韩家炜,坎伯. 数据挖掘:概念与技术[M]. 北京:机械工业出版社,2007. [11] Agrawal Rakesh, Srikant Ramakrishman. Mining sequential patterns[C] Proc of the 1lth Int'1 Conf on Data Engineering (ICDE95). Los Ala-mitos,CA:IEEE Computer Society Press,1995. 3-14 [12] 缪红保,李卫. 基于数据挖掘的用户安全行为分析[J]. 计算机应用研究,2005,(02):105-107. |