相似文献/References:
[1]龚俭,梅海彬,丁勇,等.多特征关联的入侵事件冗余消除[J].东南大学学报(自然科学版),2005,35(3):366.[doi:10.3969/j.issn.1001-0505.2005.03.010]
Gong Jian,Mei Haibin,Ding Yong,et al.Multi-feature correlation redundance elimination of intrusion event[J].Journal of Southeast University (Natural Science Edition),2005,35(5):366.[doi:10.3969/j.issn.1001-0505.2005.03.010]
[2]潘建平,顾冠群.计算机网络运输层协议的抽象模型[J].东南大学学报(自然科学版),1998,28(4):1.[doi:10.3969/j.issn.1001-0505.1998.04.001]
Pan Jianping,Gu Guanqun.Abstract Model for Transport Protocols in Computer Networks[J].Journal of Southeast University (Natural Science Edition),1998,28(5):1.[doi:10.3969/j.issn.1001-0505.1998.04.001]
[3]顾冠群,冯径.现代计算机网络发展[J].东南大学学报(自然科学版),1998,28(5):1.[doi:10.3969/j.issn.1001-0505.1998.05.001]
Gu Guanqun,Feng Jing.Development of Modern Computer Network[J].Journal of Southeast University (Natural Science Edition),1998,28(5):1.[doi:10.3969/j.issn.1001-0505.1998.05.001]
[4]吉逸,金胜昔.基于Web的远程教学系统的设计与实现[J].东南大学学报(自然科学版),1998,28(2):32.[doi:10.3969/j.issn.1001-0505.1998.02.007]
Ji Yi,Jin Shengxi.Design and Implementation of Web based Distance Instruction System[J].Journal of Southeast University (Natural Science Edition),1998,28(5):32.[doi:10.3969/j.issn.1001-0505.1998.02.007]
[5]潘建平,顾冠群,沈苏彬.快捷运输协议的研究与新进展[J].东南大学学报(自然科学版),1997,27(3):109.[doi:10.3969/j.issn.1001-0505.1997.03.021]
Pan Jianping,Gu Guanqun,Shen Subin.Survey on Xpress Transport Protocol[J].Journal of Southeast University (Natural Science Edition),1997,27(5):109.[doi:10.3969/j.issn.1001-0505.1997.03.021]
[6]罗军舟,顾冠群.协议描述和验证的基本方法[J].东南大学学报(自然科学版),1996,26(5):1.[doi:10.3969/j.issn.1001-0505.1996.05.001]
Luo Junzhou,Gu Guanqun.Basic Method for Protocol Specification and Verification[J].Journal of Southeast University (Natural Science Edition),1996,26(5):1.[doi:10.3969/j.issn.1001-0505.1996.05.001]
[7]丁心泉,吴介一.面向CIMS的MMS通信系统[J].东南大学学报(自然科学版),1996,26(5):17.[doi:10.3969/j.issn.1001-0505.1996.05.004]
Ding Xinquan,Wu Jieyi,Wu Jieyi.CIMS Oriented MMS Messaging System[J].Journal of Southeast University (Natural Science Edition),1996,26(5):17.[doi:10.3969/j.issn.1001-0505.1996.05.004]
[8]龚俭,陆晟.大规模互联网络的入侵检测[J].东南大学学报(自然科学版),2002,32(3):325.[doi:10.3969/j.issn.1001-0505.2002.03.004]
Gong Jian,Lu Sheng.Intrusion detection in large-scale network[J].Journal of Southeast University (Natural Science Edition),2002,32(5):325.[doi:10.3969/j.issn.1001-0505.2002.03.004]
[9]丁伟,吴桦.交换式互连局域网的流量分割算法[J].东南大学学报(自然科学版),1998,28(1):1.[doi:10.3969/j.issn.1001-0505.1998.01.001]
Ding Wei,Wu Hua.A Traffic Distribution Algorithm for Switched LANs[J].Journal of Southeast University (Natural Science Edition),1998,28(5):1.[doi:10.3969/j.issn.1001-0505.1998.01.001]
[10]丁心泉,顾冠群,吴介一.一种新的支持紧要时间通信的CSMA算法[J].东南大学学报(自然科学版),1997,27(1):22.[doi:10.3969/j.issn.1001-0505.1997.01.005]
[J].Journal of Southeast University (Natural Science Edition),1997,27(5):22.[doi:10.3969/j.issn.1001-0505.1997.01.005]