6Hua-Ping ZHANG, Qun LIU, Hong-Kui YU.Chinese Named Entity Recognition Using Role Model [J].Computational Linguistics and Chinese Language Processing,2003,(8): 1-31.
7Md.Golam Rashed, M.Hasnat Kabir, Muhammad Sajjadur Rahim. Cluster Based Hierarchical Routing Protocol ForWire less Sensor Network [J]. International Journal of Computer and Network Security,2010,(5)128-132.
8Sushila Madan, Ms Supriya Madan Bulwark. Against SQL Injection Attack An Unified Approach [J]. International Journal of Computer Science and Network Security,2010, (5):5-10.