4[5]Huang Ming Yuh. A large scale distributed intrusion detection framework based on attack strategy analysis [J].Computer Science,1999,31):2465-2475.
5[1]Vern Paxson. Bro: a system for detection network intruders in real-time [J]. Computer Science,1999,31): 2435-2463.
6[1]V Paxson. Bro: A system for detecting network intruders in real-time. USENIX Association, 1998, 1(1): 31~51
7[2]K Huang, Z W Xu. Scalable Parallel Computing. Hongkong: China Machine Press, 2000
8[3]D D Clark, S Shenker, L X Zhang. Supporting real-time applications in an integrated services packet network architecture and mechanism. Proc of ACM SIGCOMM, Baltimore, Maryland, USA, 1992
9[4]A Demers, S Keshavt, S Shenker. Analysis and simulation of fair queuing algorithm. Proc of ACM SIGCOMM, Austin, TX, USA, 1989
10[5]G Varghese, M Shreedar. Efficient fair queuing using deficit round robin. Proc of ACM SIGCOMM, Cambridge, MA, USA, 1995