2Boyer RS,Moore JS.A fast string searching algorithm[J].Communication of the ACM,1997; (20)
3.[EB/OL].http://www.snort.org/,.
4A Aho,M Corasick. Efficient string matching an aid to bibliographic search. 1975
5C Jason Coit,Stuart Staniford.Toward Faster String Matching for Intrusion Detection or Exceeding the Speed of Snort[J].IEEE,2001
6Daniel G Schwartz,Sara Stoechlin,Erbil Yilmaz. A Case-Based Approach to Network Itrusion Detection.ISIF 2002
7Craig A.Struble. Analysis and Implementation of Algorithms for Noncommutative Algebra, Blacksburg ,Virginia, 2000-02-24
8Mike Fisk,George Varghese. Fast Content-Based Packet Handling for Intrusion Detection[R].UCSD Technical Report CS2001-0670,2001-05
9Roesch M. Snort-lightweight Intrusion Detection for Network. Seattle,Washington, USA: Proceedings of LISA99: 13th System Administration Conference, 1999-11
10Commentz-Walter B. A String Matching Algorithm Fast on the Average. Proc. 6th International Colloquium on Automata, Languages,and Programming, 1979