相似文献/References:
[1]韩咚 田银花.基于赋时颜色Petri网的NSSK协议建模[J].计算机技术与发展,2010,(06):156.
HAN Dong,TIAN Yin-hua.The Modeling of NSSK Protocols Based on Timed Colored Petri Nets[J].,2010,(07):156.
[2]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(07):179.
[3]周彩兰 虞珊 张亚芳.基于SMTP协议解析的垃圾邮件防治技术[J].计算机技术与发展,2008,(01):188.
ZHOU Cai-lan,YU Shan,ZHANG Ya-fang.Technique of Preventing Junk Mail Based on SMTP[J].,2008,(07):188.
[4]燕振刚 罗进文.一种基于协议分析的入侵检测模型[J].计算机技术与发展,2008,(11):146.
YAN Zhen-gang,LUO Jin-wen.An Intrusion Detection Model Based on Protocol Analysis[J].,2008,(07):146.
[5]王亚楠 刘方爱.基于数据挖掘和协议分析的可扩充IDS架构[J].计算机技术与发展,2006,(01):223.
WANG Ya-nan,LIU Fang-ai.An Extensible Framework of Intrusion Detection System Based on Data Mining and Protocol Analysis[J].,2006,(07):223.
[6]蔡敏 叶震 徐吉斌.协议分析技术在入侵检测中的应用[J].计算机技术与发展,2007,(02):239.
CAI Min,YE Zhen,XU Ji-bin.Application of Protocol Analysis Technology in IDS[J].,2007,(07):239.
[7]王锦超 李飞 沈明玉.网络数据包的协议分析算法设计与实现[J].计算机技术与发展,2006,(04):30.
WANG Jin-chao,LI Fei,SHEN Ming-yu.Design and Implementation of Protocols Analysis Algorithm for Network Datagram Packets[J].,2006,(07):30.
[8]曹雪峰.基于GNS3的帧中继仿真分析[J].计算机技术与发展,2013,(05):254.
CAO Xue-feng.Frame Relay Simulation and Analysis Based on GNS3[J].,2013,(07):254.
[9]王凯,吴君钦.基于DPI技术的IM协议识别系统研究[J].计算机技术与发展,2013,(11):120.
WANG Kai,WU Jun-qin.Research on IM Protocol Recognition System Based on DPI Technology[J].,2013,(07):120.