相似文献/References:
[1]韩咚 田银花.基于赋时颜色Petri网的NSSK协议建模[J].计算机技术与发展,2010,(06):156.
HAN Dong,TIAN Yin-hua.The Modeling of NSSK Protocols Based on Timed Colored Petri Nets[J].,2010,(05):156.
[2]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(05):179.
[3]周彩兰 虞珊 张亚芳.基于SMTP协议解析的垃圾邮件防治技术[J].计算机技术与发展,2008,(01):188.
ZHOU Cai-lan,YU Shan,ZHANG Ya-fang.Technique of Preventing Junk Mail Based on SMTP[J].,2008,(05):188.
[4]燕振刚 罗进文.一种基于协议分析的入侵检测模型[J].计算机技术与发展,2008,(11):146.
YAN Zhen-gang,LUO Jin-wen.An Intrusion Detection Model Based on Protocol Analysis[J].,2008,(05):146.
[5]王亚楠 刘方爱.基于数据挖掘和协议分析的可扩充IDS架构[J].计算机技术与发展,2006,(01):223.
WANG Ya-nan,LIU Fang-ai.An Extensible Framework of Intrusion Detection System Based on Data Mining and Protocol Analysis[J].,2006,(05):223.
[6]蔡敏 叶震 徐吉斌.协议分析技术在入侵检测中的应用[J].计算机技术与发展,2007,(02):239.
CAI Min,YE Zhen,XU Ji-bin.Application of Protocol Analysis Technology in IDS[J].,2007,(05):239.
[7]王锦超 李飞 沈明玉.网络数据包的协议分析算法设计与实现[J].计算机技术与发展,2006,(04):30.
WANG Jin-chao,LI Fei,SHEN Ming-yu.Design and Implementation of Protocols Analysis Algorithm for Network Datagram Packets[J].,2006,(05):30.
[8]蒋绍林 姚金魁 施祖清 王金双 陆晓雯.基于HDLC和FR分析通信环境对协议设计的影响[J].计算机技术与发展,2012,(06):22.
JIANG Shao-lin,YAO Jin-kui,SHI Zu-qing,et al.Influence of Communication Conditions to Protocol Design Based on HDLC & FR[J].,2012,(05):22.
[9]王凯,吴君钦.基于DPI技术的IM协议识别系统研究[J].计算机技术与发展,2013,(11):120.
WANG Kai,WU Jun-qin.Research on IM Protocol Recognition System Based on DPI Technology[J].,2013,(05):120.