7Denning D E.An intrusion detection model[J].IEEE Trans on Software Eng,1987,SE-13(2):222-232.
8Spafford E H,Zamboni D.Intrusion detection using autonomous agents[J].Computer Networks,2000,34(4):547-570.
9Trusted Computing Group Incorporated.TCG PC specific implementation specification version 1.1[EB/OL].2003-08-18.https://www.trustedcomputinggroup.org/ groups/pc-client/ TCG-PCSpecificSpecification-v1-1.pdf.