2COHEN F. A note on the role of deception in information protection [EB/OL]. http ://all. net/journal/deception/deception. html. 2001-12-29.
3COHEN F. A framework for deception [EB/OL].http://all. net/journal/deception/Framework/Framework. html. 2001-12-29.
4COHEN F. A mathematical structure of simple defensive network deceptions [EB/OL]. http : //all. net /journal/deception/mathdeception/mathdeception.html. 2001-12-29.
5Tennenhouse DL, etal. Asurvey of active network research [J]. IEEE Communications Magazine, 1997, 35(1): 80-86
6Tennenhouse DL, Wetherall DJ. Towards an activen network architecture[J]. ACM Computer Communication Review, 1996.26(2)
7David J. Wetherall. Service introduction in an Active Networl [J].Massachusetts Institute of the Technology, 1999, (2)
8Merugu,S., Bhattacharjee,S., Chue.Y. ,eral. Bowman and CANES:inplementation of an active network. In: Proceedings of the 37th Annual Allerton Conference, 1999.
9Gunter C A, Nettles S M, Smith J M. The SwitchWare Active Network Architecture. IEEE Network, Special Issue on Active and Programmable Networks, 1998, 12(3)
10Architecture framework for Active Networks version DRAFT, July 1999