| Citation: | Lang Bo, Zheng Jiudan, Liu Junheet al. Research of automatic intrusion response implementation methods based on mobile agents[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(10): 901-904. (in Chinese) |
|
[1] Carver Curtis A, Hill John M D, Surdu John R. A methodology for using intelligent agents to provide automated intrusion response . Proceedings of the IEEE Systems,Man, and Cybernetics Information Assurance and Security Workshop . West Point, NY, 2000 [2] 张云勇. 移动Agent及其应用[M]. 北京:清华大学出版社,2002 Zhang Yunyong. Mobile agent and its application[M]. Beijing:Tsinghua University Press,2002(in Chinese) [3] 张 瑾,张德贤. IBM Aglet系统研究与应用[J]. 开封:河南大学学报,2002,29(3):40~43 Zhang Jin,Zhang Dexian. Research on IBM aglets system and its application[J]. Kaifeng:Journal of Henan University,2002, 29(3):40~43(in Chinese) [4] Wang Ruchuan,Zhao Xinning. The research on mobile agent secruity[J]. The Journal of China Universities of Post and Telecommunications,2002,19(3):47~52
|