7REN Shang-ping, YU Yue, CHEN Nian-en, et al. Actotrs, roles and coordinators: a coordination model for open distributed and embedded systems [ C ] // 8th International Conference on Coordination Models and Languages, Bologna, June 14-16, 2006 : 247-265.
8LEE S C, HEINBUCH D V. Training a neural- network based intrusion detector to recognize novel attacks [ J ]. IEEE Transactions on Systems, Man and Cybernetics: Part A, 2001, 31(4): 294-299.
9SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control models[ J]. Computer, 1996, 29(2) : 38-47.
10KWIAT K, REN Shang-ping. A coordination model for improving software system attack-tolerance and survivability in open hostile environments [ C ] // IEEE International Conference on Sensor Network, Ubiquitous, and Trustworthy Computing, Taiwan, June 5- 7, 2006: 1-9.