1William R Cheswick.防火墙与因特网安全[M].北京:机械工业出版社,2000..
2孙小斌 严望佳.黑客分析与防范技术[M].清华大学出版社,..
3[1]Vern P. Bro: A system for dtecting network intruders in real-time. Computer Networks, 1999, 31: 2 435~2 463
4[2]Huang Mingyuh, Robert J J, Thomas M W. A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks, 1999, 31: 2 465~2 475
5[3]Eugene H, Diego Z. Intrusion detection using autonomous agents. Computer Networks, 2000, 34: 547~570
6[4]Ning P, Wang X S, Jajodia S. Modeling requests among cooperating intrusion detection systems. Computer Communications, 2000, 23: 1 702~1 715
7Marcus Goncalves.防火墙技术指南[M].北京:机械工业出版社,2000..
8张汛来,计算机科学,1998年,10卷,专刊,156页
9王珊,数据仓库技术与联机分析处理,1998年
10Julian Kulkarni,ASAS Institute White Paper,1996年