4Barham P, Dragovic B,Fraser K,et al.Xen and the Art of Virtualization[C].proc of SOSP' 03,ACM,2003.
5陈致明 等.指挥自动化系统中网络安全体系结构研究[J].河北省科学院学报,2001,.
6Tanenbaum A S.Computer Networks.3rd edition .Prentice Hall, Inc.,1996.
7Wallach D S. A survey of peer to-peer security issues//Proceedings of the International Symposium on Software Security. Tokyo, Japan, 2002:42- 57.
8Zhou L, Zhang L, McSherry F, Immorlica N, Chien S. A first look at peer to peer worms: threats and defenses//Proceedings of the 4th International Workshop on Peer to Peer Systems (IPTPS2005). Ithaca, NY, USA, 2005:24- 35.
9Naoumov N, Ross K. Expioiting P2P systems for DDoS attacks//Proceedings of the 1st International Conference on Scalable Information Systems. Hong Kong, China 2006:1-7 (Article No. : 47).
10Douceur J R. The sybil attack//Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS 2002). Cambridge, MA, USA, 2002:251-260.