[1]
Yan Xue: Several Methods of the Hacker (Wanfang Data Electronic publishing house, Beijing 2000).
Google Scholar
[2]
Long Yimin: Network Invasion and Measuring. Computer Project and Science, No. 1 (2001), pp.28-30.
Google Scholar
[3]
Tang Zhengjun: Design and Realizing of the Intrusion Detection System (Electronic Industry Press, Beijing 2002).
Google Scholar
[4]
Luo Shoushan: Intrusion Detection System (Beijing University of Post & Telecommunication publishing house, Beijing 2004).
Google Scholar
[5]
Jin Bo and Lin Jiajun: Summary of Intrusion Detection Technique. Journal of East of China University, Vol. 26, No. 2 (2005), pp.80-82.
Google Scholar
[6]
Jiang Jianchun and Feng Dengguo: The Principle and Technology of IDS (National defense industry Publishing house, Beijing 2004).
Google Scholar
[7]
Liu Yi-hong: Research and Implementation of the Intrusion Detection System, Hunan University (2008).
Google Scholar
[8]
Ding Yong and Yu Ping: Research on Automatic Intrusion Responding System. Computer Science, No. 10 (2003), pp.160-166.
Google Scholar
[9]
Liu Si-jia: Research on Intelligent Network Intrusion Detection Method, Xihua University (2009).
Google Scholar
[10]
Lin Guoyuan and Huang Hao: The Evolving Intrusion Detection System. Computer Science, Vol. 135, No. 2 (2008), pp.69-74.
Google Scholar
[11]
LI Rongxin: Model of Distributed Intrusion Detection System Base on Mobile Agents. Micro-computer Information, Vol. 24, No. 2 (2008), pp.72-74.
Google Scholar