6Lippmann R,Webster S, Stetson D. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection [C]//Proc of the 15th Int Symp on Recent Advances in Intrusion Detection. Berlin: Springer, 2002: 307-326.
7Sommer R, Paxson V. Enhancing byte-level network intrusion detection signatures with context [C]//Proc of the 10th ACM Conf on Computer and Communications Security. New York: ACM, 2003:262-271.
8Kruegel C, Robertson W. Alert verification: Determining the success of intrusion attempts [C]//Proc of the 1st Workshop on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA). Berlin: Springer, 2004, 2622-2628.
9Gula R. Correlating IDS Alerts with Vulnerability Information [M]. Englewoocl Cliffs, NJ: Prentice Hall, 2003.
10Desai N. IDS Correlation of VA Data and IDS Alerts [M]. EnglewooeI Cliffs, NJ: Prentice Hall, 2005.