5AHO A V, CORASICK M J. Efficient string matching: an aid to bibliographic search [J]. Communications of the ACM,1975,18(6): 330-340.
6KUMAR S, TURNER J, WILLIAMS J. Advanced algorithms for fast and scalable deep packet inspection [C]ffProceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems(ANCS' 06), Dec 3-5,2006,San Jose, CA, USA. New York, NY USA:ACM. 2006:81-92.
7NAGHMOUCHI J, SCARPAZZA D P, BEREKOVIC M. Small-ruleset regular expression matching on GPGPUs: Quantitative performance analysis and optimization [C]//Proceedings of the 24th ACM International Conference on Supercomputing(ICS' 10), Jun 2-4,2010, Tsukuba, Ibaraki, Japan. New York, NY, USA: ACM. 2010: 337-348.
8LIN Y R, HUANG H Y, HSU W H. An embedded watermark technique in video for copyright protection [C]//Proceedings of theIEEE 18th International Conference on Pattern Recognition (ICPR '06): Vol 4, Aug 20-24, 2006, Hong Kong, China. Piscataway, NJ,USA: IEEE, 2006:795-798.
9SUN Q, HE D, TIAN Q. A secure and robust authentication scheme for video transcoding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(10): 1232-1244.
10WANG W H, FAFID H. Exposing digital forgeries in video by detecting double MPEG compression IC]//Proceedings of the ACM Muhimedia and Security Workshop(MM&Sec'06), Sep 26-27,2006, Geneva, Switzerland. New York, NY,USA: ACM. 2006:37-47.
8Tao Jian,President of the University of International Relations. Zhang Yimeng.Ways to Advance China's "Going Out" Policy[J].Contemporary International Relations,2011,21(5):101-103.