8Nicol D M,Sanders W H.Trivedi K.S.Model based evaluation:From dependability to security[J].IEEE Transactions on Dependable and Secure Computing,2004,4(01):48-65.
6sAVAGE S,WETHERALL D,KARLIN A,et al.Network support for IP traceback[J].IEEE Trans on Networking,2001,1(3):226-237.
7QIU Xiao-feng,HAO Ji-hong,CHEN Ming.A mechanism to defend SYN flooding attack based on network measurement systemiC].London:IEEE In-ternational Conference on Information Technology,Research and Education(ITRE)2004,2004.
8WEAVER N,PAXSON V,STANIFORD S,et al.A taxonomy of computer worms[C].Washington:ACM CCS Workshop on Rapid Malcode(WORM),2003.
9Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页