相似文献/References:
[1]韩咚 田银花.基于赋时颜色Petri网的NSSK协议建模[J].计算机技术与发展,2010,(06):156.
HAN Dong,TIAN Yin-hua.The Modeling of NSSK Protocols Based on Timed Colored Petri Nets[J].,2010,(01):156.
[2]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(01):179.
[3]燕振刚 罗进文.一种基于协议分析的入侵检测模型[J].计算机技术与发展,2008,(11):146.
YAN Zhen-gang,LUO Jin-wen.An Intrusion Detection Model Based on Protocol Analysis[J].,2008,(01):146.
[4]王亚楠 刘方爱.基于数据挖掘和协议分析的可扩充IDS架构[J].计算机技术与发展,2006,(01):223.
WANG Ya-nan,LIU Fang-ai.An Extensible Framework of Intrusion Detection System Based on Data Mining and Protocol Analysis[J].,2006,(01):223.
[5]蔡敏 叶震 徐吉斌.协议分析技术在入侵检测中的应用[J].计算机技术与发展,2007,(02):239.
CAI Min,YE Zhen,XU Ji-bin.Application of Protocol Analysis Technology in IDS[J].,2007,(01):239.
[6]王锦超 李飞 沈明玉.网络数据包的协议分析算法设计与实现[J].计算机技术与发展,2006,(04):30.
WANG Jin-chao,LI Fei,SHEN Ming-yu.Design and Implementation of Protocols Analysis Algorithm for Network Datagram Packets[J].,2006,(01):30.
[7]曹雪峰.基于GNS3的帧中继仿真分析[J].计算机技术与发展,2013,(05):254.
CAO Xue-feng.Frame Relay Simulation and Analysis Based on GNS3[J].,2013,(01):254.
[8]王凯,吴君钦.基于DPI技术的IM协议识别系统研究[J].计算机技术与发展,2013,(11):120.
WANG Kai,WU Jun-qin.Research on IM Protocol Recognition System Based on DPI Technology[J].,2013,(01):120.