期刊文献+

提高监理素质迫在眉睫

下载PDF
导出
作者 马应章
出处 《软件世界》 2006年第3期80-80,共1页 eSAS World
  • 相关文献

参考文献4

二级参考文献17

  • 1[1]Gusfield D.Algorithms on Strings,Trees,and Sequences:Computer Science and Computational Biology[M].University of California Press,CA, 1997
  • 2[2]Charras C,Lecroq T.Exact String Matching Algorithms. 1997
  • 3[3]Boyer R S,Moore J S.A fast string searching algorithm[J].Communications of the ACM, 1977 ;20(10) :762~772
  • 4[4]Aho A,Corasick M.Efficient string matching:an aid to biliographic search[J].Comm ACM, 1975; 18:33~40
  • 5[5]Fiskyx M,Varghese G.Fast Content-Based Packet Handling for Intrusion Detection[R].UCSD Technical Report CS2001-0670,2001-05
  • 6[6]Coit C J,Staniford S,McAlemey J.Towards faster patern matching for intrusion detection or exceeding the speed of snort[C]. In:DARPA Information Survivability Conference and Exposition,2001
  • 7Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4.
  • 8Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232.
  • 9Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990.
  • 10Bonifaco J M, Moreira E S. An adaptive intrusion detection system using neural network[M]. Brazil: UNESP, 1997.

共引文献92

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部