1[3]A Fuggetta,G Picco,G Vigna.Understanding code mobility[J].IEEE Trans on Software Engineering,1998,24(5):342-361
2[4]Robert S Gray,David Kotz,Ronoald A Peterson.Mobile-agent versus client/server performance:Scalability in an information-retrieval task[OL].http://www.cs.darmouth.edu/reports/abstracts/TR2001-386,2001-06
3[5]S Gray R S.Agent Tel:A flexible and secure mobile agent system[OL].http://www.cs.darmouth.edu/reports/abstracts/TR98-327,2001-06
4[6]Tao Xianping,Lu Jian,Dong Hua,et al.Mobile agent:One of the main paradigms of future distributed computing[J].Computer Science,1999,26(2):1-6
5[7]Midori ASAKA,Shunji OKAZAWA.A method of tracing intruders by use of mobile agents[OL].http://www.ipa.go.jp/STC/IDA,2002
6[8]Salvatore Stolfo,Andreas L Prodromidisy.JAM:Java agents for meta-learning over distributed databases[OL].http://www.cs.columbia.edu/~sal/JAM/PROJECTS/,2002
7[9]Mark Slagell.The design and implementation of MAIDS[OL].http://latte.cs.iastate.edu/Reseaerch/Intrusion/,2002