2Lin P,Distributed and Parallel Databases,2000年,8卷,1期,7页
3Jajodia S,Proc IST 4th Symposium on Protecting NATO Information Systems,1999年,20-1-20-7页
4吴敏毓 刘恭植.医学免疫学[M].合肥:中国科学技术大学出版社,1999..
5Amoroso E. G.. Intrusion Detection: An Introduction to Internet Surveillance,Correlation,Trace Back,Traps,and Response. Intrusion. Net Books, 1999
6Northcutt S., Novak J.. Network Intrusion Detection: An Analysts' Handbook. New Riders, 2000
7Du W., Mathur A.P.. Vulnerability testing of software system using fault injection. Department of Computer Science, Purdue University: Technical Report Coast TR-98-02, 1998
8MCNC and D University. Sitar: A scalable intrusion tolerant architecture for distributed services. Technical Report, Research Proposal to DARPA BAA-00-15, 2000
9Krsul I., Spafford E. H., Tripunitara M. V.. Computer vulnerability analysis. Department of Computer Science, Purdue University, Technical Report Coast TR 98-07, 1998
10Lee P.A., Anderson T.. Fault Tolerance: Principles and Practice. Springer-Verlag, 1990