2Schneier B.Secrets and Lies: Digital Security in a Networked World. Journal of Women s Health . 2000
3Tolba M,Abdel Wahab M,Taha I et al.GIDA: Toward enabling grid intrusion detection systems. Proceedings of the 5th IEEE/ACM Int. Symp. on Cluster Computing and the Grid(CCGrid2005) . 2005