1[1]Wayne Jansen, Peter Mell,Tom Karygiannis,Don Marks.Ap-plying Mobile Agents to Intrusion Detection and Response.IST Interim Report (IR)-6416 October 1999 [R]. NIST,1999,2,5-7.
2[2]Todd Sundsted. An introduction to agents [EB/OL]. http://www.javaworld.com/jw-06-1998/jw-06-howto.html, 1998.
3[3]Hyacinith S Nwana. Software Agents: An Overview. Know-ledge Engineering Review[M].Knowledge Engineering Re-view, 1996.
4[4]Jansen W, Mell P, Karygiannis T, Marks D. Mobile Agents inIntrusion Detection And Response [R]. Proceeding of 12thAnnual Canadian Information Technology Security Sympo-sim,Ottawa, Canada,June 2000.
5[5]Mark Slagell. The degsign and Implementation of MAIDS[EB/OL]. http://latte.cs.iastate.edu/ms/cc.html.
6[6]Asaka M,Okazawa S,Taguchi A,Goto S. A Method of Trac-ing Intruders by use of Mobile Agents [J]. INET99, June1999.
8[8]Guy Helmer, Johnny S.K.Wong,Vasant Honavar and Les Mil-ler. Intelligent Agents for Intrusion Detection[J]. Proceedingof the IEEE information Technology Conference,Syracuse,NY, September 1998.
9[9]Wayne Jansen, Tom Karygiannis. Mobile Agents and Secur-ity[M]. NIST Special Publication 800-19, 1999.
10Rebecca Bace,Peter Mell.Intrusion Detection Systems[M].NIST Special Publication on Intrusion Detection Systems,1999.