1[1]Patel NM. Knowledge Base for Intrusion Detection System[D]. Department of Computer Science Florida State University,2002. 11-22. 被引量:1
2[2]Needham R,Schroeder M. Using Encryption for Authentication in Larger Networks of Computers[J]. Communications of ACM,1978,21(12):994-995. 被引量:1
3[3]Yasinsac A,Goregaoker S. An Intrusion Detection System for Security Protocol Traffic[D]. Department of Computer Science Florida State University,2002. 被引量:1