[J] 北京邮电大学学报, 2004, 27(4): 83-86. Yang Wu, Fang Binxing, Yun Xiaochun, et al. Research and implementation of a high-performance distributed intrusion detection system
[3]
[J] Journal of Beijing University of Posts and Telecommunications, 2004, 27(4): 83-86.
[4]
柴平, 龚向阳, 程时端. 分布式入侵检测技术的研究
[5]
[J] 北京邮电大学学报, 2002, 25(2): 68-73. Chai Pingxuan, Gong Xiangyang, Cheng Shiduan. Research on distributed intrusion detection
[6]
[J] Journal of Beijing University of Posts and Telecommunications, 2002, 25(2): 68-73.
[7]
Kurmann A, Rauch F, Stricker T. Speculative defragmentation-leading gigabit Ethernet to True zero-copy communication . Cluster Computing, 2001, 4(1): 7-18.
[8]
Rubini A, Corbet J. LINUX device drivers
[9]
[M] Sebastopol: O'Reilly & Associates, 2002.
[10]
胡希明, 毛德操. LINUX内核源代码情景分析
[11]
[M] 杭州: 浙江大学出版社, 2001. Hu Ximing, Mao Decao. Analysis the nuclear code of LINUX
[12]
[M] Hangzhou: Zhejiang University Press, 2001.
[13]
Charras C, Lecroq T T. Exact string matching algorithms
[14]
[M] London: King's College London Publications, 2004.
[15]
Welsh M, Basu A, Eicken T. Incorporating memory management into user-level network interfaces . NY: Cornell University Ithaca, 1997.
[16]
Jacob B, Mudge T. Software-managed address translation //In Proceedings of the 3rd International Symposium on High Performance Computer Architecture. Texas: San Antonio, 1997: 156-157.