[1]
Lu H. Y, Liang. H. Wang H. C, Wang H. J, WANG X. B. (2010) Dodos attack source tracing technology research Based on IPv6. IEEE International Conference on Internet Technology and Applications (ITAP 2010), 2010, Wuhan, China 1(4): 112-114.
DOI: 10.1109/itapp.2010.5566634
Google Scholar
[2]
CooPer, M., Feamow , M., Frederiek, K. a, ldNorthcut, S (2001) Intrusion Signatures andAnaysis. 1st Edition-New Riders Publishing, January 2(6): 337-339.
Google Scholar
[3]
Stutzle T. Hoos HH. MAX-MIN ant xystem and localsearch (1997) for the traveling salesman In IEEEInt'1 Confront Evolutionary Computation. Indianapolis: IEEE Press309-314.
DOI: 10.1109/icec.1997.592327
Google Scholar
[4]
Bilchev G. Parmee IC (1995) Adaptive searching strategic for heavily constrained design spaces Proceedings of 22nd International Conference on Computer Aided Design Yalta: U k rainc 4(4): 861-864.
Google Scholar
[5]
ColoA., norigoM Maniezzov (1991) Instituted optimization by anthologies. Proceedings of the First European Conference on Artificial Life 5(3): 255-259.
Google Scholar
[6]
Dorigo M Maniezzov Colombia (1996) Nosy stem: optimization by apology of cooperating agents. IEEET transactions on Systems, Man, and Cy beetles Parts 6(l): 29-41.
Google Scholar
[7]
Marco Dorigo and Thomas StUtzle(2004) A, ItColo, lyOPtimization MIT Press 541-546.
Google Scholar
[8]
Zhang. B. Li W. H (2006) Study on Phishing Attack Behavior land Defense Model, The 2006 IEEE/WIC/ACM International Con forenoon Web intelligence, Hong Kong 8(5): 631-640.
Google Scholar