1Schaelicke L,Slabach T,Moore B,et al.Characterizing the performance of network intrusion detection sensors[A].Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003)[C].Lecture Notes in Computer Science,Springer-Verlag,2003.
2Coit J,Staniford S,McAlerney J.Towards faster string matching for intrusion detection or exceeding the speed of snort[A].Proc DARPA Information Survivability Conference and Exposition (DISCEX Ⅱ '02)[C].Los Alamitos,Calif:IEEE CS Press,2001.367-373.
3Edwards S.Vulnerabilities of Network Intrusion Detection Systems:Realizing and Overcoming the Risks[Z].Toplayer Networks,2002.
4Kruegel C,Valeur F,Vigna G,et al.Stateful intrusion detection for high-speed networks[A].Proceedings of the IEEE Symposium on Security and Privacy[C].Berkeley,CA:IEEE,2002.285-294.
5Asser N.Tantawi,Don Towsley.Optimal static load balancing in distributed computer systems[J].Journal of the ACM,1985,32(2):445-465.
6Keith W R,David D Y.Optimal load balancing and scheduling in a distributed computer system[J].Journal of the ACM,1991,38(3):676-690.