3Chen Fuhgwo,Chen Rueymaw,Chen Jrshian.“A Portable Virtual Laboratory for Information Security Courses”,Advancesin Computer Science,Environment,Ecoinformatics,and Education[J].Communications in Computer and Information Science,2011(218):245-250.
5Wang Y,Jiang H,Liu Z,et al.A CRF-Based Method forDDo S Attack Detection. Proceedings of the 4th Internation-al Conference on Computer Engineering and Networks . 2015