Citation: | Chen Haitao, Pei Jinze, Hu Huaping, et al. Research on self-adapted security cooperation framework based on peer-to-peer network[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(11): 1133-1136. (in Chinese) |
[1] Peter G, Neumann,Phillip A, et al. Experience with EMERALD to Date . In:First USENIX Workshop on Intrusion Detection and Network Monitoring . California:Santa Clara, 1999. 73~80 [2]Eugene H, Spafford, Deigo Zamboni. AAFID:Intrusion detection using autonomous agents[J]. Computer Networks, 2000,34:547~570 [3] 徐传福. 基于P2P的广域网内容发布系统关键技术研究 . 长沙:国防科技大学计算机学院,2003 Xu Chuanfu. Research on key technology of wan content distribution system based on peer-to-peer technology . Changsha:School of Computer Science, National University of Defence Technology, 2003(in Chinese) [4] Stoica I, Morris R, Karger D, et al. Chord:A scalabl peer-to-peer lookup service for Internet applications . MIT-TR-819, 2001 [5]Zhao B Y, Kubiatowicz J D, Joseph A D. Tapestry:An infrastructure for fault-resilient wide-area location and routing . UCBCSD-01-1141, 2001 [6]Sameh El-Ansary, Luc Onana Alima, Per Brand, et al. Efficient broadcast in structured P2P networks . In:Michal Feldman, Shelley Zhuang, eds. Peer-to-Peer Systems II:Second International Workshop . Heidelberg:Springer-Verlag, 2003. 304~314
|