1Verwoerd Theun,Hunt Ray.Security Architecture Testing Using IDS:A Case Study[J].Computer Communications,2002,25:1402-1412.
2Coit C J,et al.Towards Faster String Matching for Intrusion Detection or Exceeding the Speed of Snort[EB/OL].http://philby.ucsd.edu/~cse291_IDVA/papers/coit,staniford,mcalerney.towards_faster_st-ring_matching_for_intrusion_detection.pdf,2005-01.
3Sun Kim.A New String-Pattern Matching Algorithm Using Partitioning and Hashing Effectively[J].Journal of Experimental Algorithmics,1999,12:1-18.
4Rafeeq Ur Rehman.Intrusion Detection Systems with Snort:Advanced IDS Techniques Using Snort,Apache,MySQL,PHP,and ACID[M/CD].Prentice Hall PTR,2003.