1[1]LINGER R C,MEAD N R,Lipson H F.Requirements definition for survivable network systems[A].Requrements Engineering'98[C].Colorado,April 1998.14-23.
2[2]Understanding symantec's anti-virus strategy for internet gateways[EB/OL].http://www.symantec.com/avcenter/reference/wpnavieg.pdf,1999-09.
3[3]COHEN F.Computer viruses: theory and experiments[J].Computers & Security,1987,6(2):22-35.
4[4]ALLEN J,CHRISTIE A.State of the practice of intrusion detection technologies[R].CMU/SEI-99-TR-028,Carnegie Mellon University:Software Engineering Institute,2000.
5[5]STEVENS W R.TCP/IP Illustrated,Volume 1:the Protocols[M].USA:Addison Wesley,1994.