4Giovanni Vigna and Richard A. Kemmerer,《NetSTAT: h Network-based Intrusion Detection Approach》[M] University of California Santa Barbara, 2000. 被引量:1
5Xiaoyun Wang, Dongguo Feng, Xuejia Lai. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD [M], 2004. 被引量:1
6Han-Ping Hu, King Liang, Bao-Liang adaptive security active defense[J]. end-system model Zhang. hn based on Communications Systems,2004,331- 335. 被引量:1