2Joel Ortiz,Johnly Tomelden.Component Based Information Network for Computer Security[C] //Sixth InternafionM Conference on Information Technology:New Generations,2009:467-469. 被引量:1
3Snort and Sourcefire,"Snort",Snon.org@2005 Sourcefire,Inc.All Rights Reserved. 被引量:1
4LI Lei-jun,PENG Hong.A Defense Model Study Based on IDS and Firewall Linkage[C] //2010 International Conference of Information Science and Management Engineering,2010:91-94. 被引量:1
5Deng Zi-kuan,Fan Ming-niu.TCP Flow Restructuring of Snort Intrusion Detection System[J].Information Security and Communication Security,2007,(2):65-67. 被引量:1
6Ahsan Kamran,Covert Channel Analysis and Data Hiding in TCP/IP[D].University of Toronto,2002. 被引量:1
7马传龙,张涛,熊伟.基于Snort的入侵防御系统的研究[J/OL].1994-2010 China Academic Journal Electronic Publishing House.http://www.cnki.net. 被引量:1