Weiwei LI,Tao ZHANG,Yuanyuan MA,Cheng ZHOU. A method of SQL access logs pretreatment for power business system[J]. Telecommunications Science, 2015, 31(Z1): 120-124.
方杰, 朱京红 . 日志挖掘中的数据预处理[J]. 计算机技术与发展 2010,20(4): 17-20. FANG J , ZHU J H . Data pretreatment of log mining[J]. Computer Technology and Development, 2010,20(4): 17-20.
[2]
HELMAN P , LIEPINS G . Statistical foundations of audit trail analysis for the detection of computer misuse[J]. IEEE Transactions on Software Engineering, 1993,19(9):886-901.
[3]
BISKUP J . Recent advances in intrusion detection[M]. Berlin: Springer, 2000:28-48.
[4]
王渊, 马骏 . 一种基于入侵检测的数据库安全审计[J]. 计算机仿真 2007,24(2): 33-36. WANG Y , MA J . A method of database secure audit based on intrusion detection[J]. Computer Simulation, 2007,24(2): 33-36.
[5]
张春玲, 吕震宇, 刘遵峰 . 基于虚拟日志压缩的数据同步方案[J]. 计算机工程 2010,18(36): 67-69. ZHANG C L , LV Z Y , LIU Z F . Data synchronization solution based on virtual log compression[J]. Computer Engineering, 2010,18(36): 67-69.
[6]
王艳峰, 王正, 阎保平 . 一种高效的DNS日志压缩算法[J]. 计算机工程 2010,15(36): 32-35. WANG Y F , WANG Z , YAN B P . High-efficient DNS log compression algorithm[J]. Computer Engineering, 2010,15(36): 32-35.