Al-Shaer E, Hamed H. Firewall Policy Advisor for Anomaly Detection and Rule Editing[ J ]. IEEE Integrated Management,2003, 22(4): 34-46.
[2]
.Hari B, Suri S.,.Parulkar G. Detecting and Resolving Packet Filter Conflicts[C]// Proceedings of Policy’2001 Workshop, Israel:Tel Aviv, 2001.1203-1212
[3]
.Mayer A,.Wool A , Ziskind E.. Fang: A Firewall Analysis Engine[C]// Proceedings of IEEE Symposium on Security and Privacy.Washington:IEEE Computer Society 1997.177-187.
Huang Qing, Wang Wendong. Fast Flow Classification Using Split United Hierarchy [J]. Journal of Beijing University of Posts and Telecommunications, 2003, 26(4): 69-73.
[6]
杨放春.下一代网络中的关键技术[J].北京邮电大学学报,2003,26(1):1-8.
[7]
Yang Fangchun. Key Technologies Towards Next Generation of Network [J]. Journal of Beijing University of Posts and Telecommunications, 2003, 26(1):1-8