2Lechner S.SAMSON:management of security in open systems[J].Computer Communications,1994(9).
3Stamatelopoulos F,Koutepas G,Maglaris B.System security management via SNMP[C]//Proceedings of the 4th HPOVUA Workshop on Network and Systems Management,Madrid,Spain,1997-04.
4Hyland P C.Concentric supervision of security applications:a new security management paradigm[C]//Annual Computer Security Applications Conf,1998.
5Soon C K,Young S C,Jin W C.Study of security management system based on client/server model[C]//ICC 1999-IEEE International Conference on Communications,1999(1):1403-1408.
6Boudaoud K,McCathieNevile C.An intelligent agent-based model for security management[C]//Proc of the Seventh IEEE Symposium on Computers and Communications,2002(7).
7Dawkins J,Clark K,Manes G,et al.A framework for unified network security management:identifying and tracking security threats on converged networks[J].Journal of Network and Systems Management,2005,13(3).
8Kienzle D M,Elder M C.Recent worms:a survey and trends[C]//Staniford S.Proc of the ACM CCS Workshop on Rapid Malcode (WORM 2003).Washington,2003.