Citation: | Huang Xin, Yin Baolin. Multi-level and multi-policy model of distributed network information filtering system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(10): 919-922. (in Chinese) |
[1] 辛 涛, 周明天. 混合型防火墙的设计与实现[J]. 计算机研究与发展, 1998, 35(10):882~885 Xin Tao, Zhou Mingtian. Design and implementation of a hybrid fire-wall system[J]. Compute Research & Development, 1998, 35(10):882~885(in Chinese) [2] Younglove R. Virtual private networks——how they work[J]. Computing & Control Engineering Journal, 2000, 11(11):260~266 [3] 马太恒, 姜建春, 陈伟锋,等. 基于Agent的分布式入侵监测系统模型[J]. 软件学报, 2000, 11(10):1312~1319 Ma Taiheng, Jiang Jianchun, Chen Weifeng,et al. Distributed model of intrusion detection system based on agent[J]. Journal of Software, 2000, 11(10):1312~1319(in Chinese) [4] Lerida J L, Grackzy S M, Vina A. Detecting security vulnerabilities in remote TCP/IP networks:an approach using security scanners . Proceedings of IEEE 33rd Annual 1999 International Carnahan Conference . Madrid, 1999. 446~460 [5] Banisar D. Battle for control of encryption technology[J]. IEEE Software, 1993, 10(4):95~97
|