3Rebecca Bacel, Peter Mell2. Intrusion Detection Systems. NIST Special Publication ,2000
4Scut/team Teso. Exploiting Format String Vulnerabili- ties. http://www. team-teso.net/. 2001-03-17
5Kalou/Pascal Bouchareine. Format String Vulnerabilities. http://www. hert.org
6Pawlak Z,Slowinski R.Rough Set Approach to Multi-attribute Decision Analysis. Invited Review[J].Eu-ropean Journal of Operational Research, 1994,72:443
7Son N H. Discretization of Real Value Attributes:A Boolean Reasoning Approach [Ph.D Thesis].1997-11
8殷秦.基于云计算服务的Web性能测试服务系统开发[D].北京:清华大学.2010.
9Ayewah N,Pugh W.Evaluating Static Analysis Defect Warnings On Production Software[C]//Proceedings of the 7th ACM SIGPLAN SIGSOFT workshop on Program analysis for software tools and engineering,2007:1-8.
10Hovemeyer D,Pugh W.Finding More Null Pointer Bugs,But Not Too Many[C]//Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering,2007:9-14.