[1] 杨武, 方滨兴, 云晓春, 等. 一种高性能分布式入侵检测系统的研究与实现
[J]. 北京邮电大学学报, 2004, 27(4): 83-86. Yang Wu, Fang Binxing, Yun Xiaochun, et al. Research and implementation of a high-performance distributed intrusion detection system
[J]. Journal of Beijing University of Posts and Telecommunications, 2004, 27(4): 83-86.
[2] 柴平, 龚向阳, 程时端. 分布式入侵检测技术的研究
[J]. 北京邮电大学学报, 2002, 25(2): 68-73. Chai Pingxuan, Gong Xiangyang, Cheng Shiduan. Research on distributed intrusion detection
[J]. Journal of Beijing University of Posts and Telecommunications, 2002, 25(2): 68-73.
[3] Kurmann A, Rauch F, Stricker T. Speculative defragmentation-leading gigabit Ethernet to True zero-copy communication . Cluster Computing, 2001, 4(1): 7-18.
[4] Rubini A, Corbet J. LINUX device drivers
[M]. Sebastopol: O'Reilly & Associates, 2002.
[5] 胡希明, 毛德操. LINUX内核源代码情景分析
[M]. 杭州: 浙江大学出版社, 2001. Hu Ximing, Mao Decao. Analysis the nuclear code of LINUX
[M]. Hangzhou: Zhejiang University Press, 2001.
[6] Charras C, Lecroq T T. Exact string matching algorithms
[M]. London: King's College London Publications, 2004.
[7] Welsh M, Basu A, Eicken T. Incorporating memory management into user-level network interfaces . NY: Cornell University Ithaca, 1997.
[8] Jacob B, Mudge T. Software-managed address translation //In Proceedings of the 3rd International Symposium on High Performance Computer Architecture. Texas: San Antonio, 1997: 156-157.
[9] Denning P J. Virtual memory
[J]. ACM Computing Surveys (CSUR),1970, 2(3): 153-189.
[10] Bjorkman M, Gunningberg P. Performance modeling of multiprocessor implementations of protocols
[J]. IEEE/ACM Transactions on Networking, 1998, 6(3): 262-273.
|