Computer Science ›› 2013, Vol. 40 ›› Issue (12): 174-176.
Previous Articles Next Articles
SUN Wen-jing and QIAN Hua
[1] Boyer R S,Moore J S.A fast string searching algorithm [J].Communications of the ACM,1977,20(10):762-772 [2] 李洋,王康,谢萍.BM模式匹配改进算法[J].计算机应用研究,2004,21(4):58-59 [3] 杨薇薇,廖翔.一种改进的BM模式匹配算法[J].计算机应用,2006,26(2):318-319 [4] Roesch M.Snort:Lightweight Intrusion Detection for Networks[C]∥ LISA’ 99Proceedings of the 13th USENIX Conference on System Administration.1999:229-238 [5] http://www.ll.mit.edu/IST/ [6] 魏旻,王一帆,李玉, 等.基于WIA-PA网络的周界入侵检测系统设计与实现[J].重庆邮电大学学报:自然科学版,2013,5(2):148-153 |
No related articles found! |
|