[1]
Liu H, Yu L. Toward integrating feature selection algorithms for classification and cluatering[J]. IEEE Tram. on Knowledge and Data Engineering, 2005, 17(3): 1-12.
Google Scholar
[2]
Chu Lingyu, Wu Xuezhi, Qi Wenjuan. Discussion in the Security Mechanisms of IPv6 [J]. Microcomputer Information, 2006, 22(1): 10-13.
Google Scholar
[3]
Zhang Yuegong, Li Daxing. Analysis of Network Attack and Intrusion under IPv6 [J]. Computer Science, 2006, 33(2): 100-102.
Google Scholar
[4]
Zhang Daoqiang, Chen Songcan. Analysis on the Method of Dimension Reduction about High-Dimension Data [J]. China Computer Federation, 2009, 5(8): 15-21.
Google Scholar
[5]
Liu Shijie. Analysis on the Network Threat and Security Technology under IPv6 . Master degree paper, Zhengzhou: The PLA Information Engineering University. (2007).
Google Scholar
[6]
ALMGREN M, LINDQVIST U. Application-Integrated Data Collection for Security Monitoring [A]. Proceedings of the Fourth International Symposium on the Recent Aduances in Intrusion Detection (RAID2001)[C]. 2001: 22-36.
DOI: 10.1007/3-540-45474-8_2
Google Scholar
[7]
Han Donghai, Wang Chao, Li Qun. Case Analysis of Intrusion Detection System [M]. Beijing: Tsinghua University Press, (2002).
Google Scholar
[8]
Tang Zhenjun (eds). Design and Implementation of Network Intrusion Detection System [M]. Beijing: Publishing House of Electronics Industry, (2002).
Google Scholar
[9]
RFC2893, Transition Mechanisms for IPv6 Hosts and Routers[S].
Google Scholar
[10]
Gilligan R. Basic Transition Mechanisms for IPv6 Hosts and Routers [Z]. RFC4213, (2005).
DOI: 10.17487/rfc4213
Google Scholar
[11]
Sun Yong, Zhang Heng, Ma Yan. IPv6-based Interaction System with Intrusion Detection and Firewall [J]. Computer Engineering 2008, 34(11): 152-154.
Google Scholar
[12]
Colt C J, Staniford S. Toward Faster String Matching for Intrusion Detection or Exceeding the Speed of Snort[A]. Proceedings of 2nd DARPA Information Survivability Conference and Exposition(DISCEX 2)[C]. Piscataway: IEEE CS Press. 2001: 367-373.
DOI: 10.1109/discex.2001.932231
Google Scholar