7JHA S, HASSAN M. Building agents for rule-based intrusion detection system[J]. Computer Communication, 2002, 25(15): 1366-1373.
8张云勇 刘锦德.移动Agent技术[M].北京:清华大学出版社,2004..
9AMOROSO E G.Intrusion Detection:An intrusion to internet surveillance,CorrelaTion,Traps,Trace Back,and Response[EB/OL].http://www.intrusion.net/,1999.
10GOLDBERG I,WANGNER D,THOMANS R,et al.A secure environment for untrusted helper applications(confining the wily hacker)[A].ICN GOLDBENG.In proceedings of the sixth USENIX UNIX security symposium[C].California USA:USENIX Association,1996.