3Di Lucca,Rita Fashlino,Porfirio Tramontana.Reverse Engineering Web Application:the WARE Approach[J].Journal of Software Maintenance and Evolution:Reseach and Practice,2004.(16):71-101.
4冯长根,刘振翼.信息安全的现状与若干进展[J].安全与环境学报,2000(5):406-410.
5ISO/IEC3309:1993.Telecommuication and information exchange between system-high-level data link control(HDLC)procedures-fame structure[S].1993.
6Jan Axeleson.串行端口大全[M].北京:中国电力出版社,2001.
7Hearst M.Untangling text data mining[C]//Proceedings of the 37th Annual Meeting of Association for Computational Linguistics,University of Maryland,1999:27-56.
8Hotho A,Staab S,Stumme G.Ontogies improve text document clustering[C]//Proceedings of the 3rd IEEE International Conference on Data Mining,Melbourne,Florida,USA,2003:541-544.
9Yang H C,Lee C H.A text mining approach for automatic construction of hypertexts[J].Expert Systems with Applications,2005(4):723-734.
10Hammer J,et al.Extraction Semistructured Information from the Web.