Boyer RS.Moore J S.A fast string searching algorithm[J].Communications of the ACM,1977,20(10):762-772.
[2]
Daniel M Sunday.A very fast substring search algorithm[J].Commun.ACM,1990,33(8):132-142.
[3]
伊静,刘培玉.入侵检测中模式匹配算法的研究[J].计算机应用与软件,2005,22(1):112-114.Yi Jing,LiuPeiyu.The survey of the pattern matching algorithm in intrusion detection system[J].Computer Applications and Software,2005,2(1):112-114.(in Chinese)
[4]
苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811.Su Purui,Feng Dengguo.An anomaly intrusion detection model based On nonhierarchical clustering[J].Acta Electronica Sinica,2006,34(10):1809-1811.(in Chinese)
[5]
刘功申,王永成,许欢庆.基于字频的单模式匹配算法[J].电子学报,2002,30(12):2079-2082.Liu Gongshen,Wang Yongcheng,Xu Huanqing.A single pattern matching algorithm based on character frequency[J].Acta Electronica Sinica,2002,30(12):2079-2082.(in Chinese)
[6]
Knuth D E,Morris J H,Pratt V R.Fast pattern matching in strings[J].SIAM Journal on Computing,1997,6(1):323-350.
[7]
R S Boyer,J s Moore.A fast suing searching algorithm[J].Commun.ACM,1977,20(10):762-772.
[8]
HORSPOOL RN.Practical fast searching in strings[J].Software-Practice and Experience,1980,10(6):501-506.