共 11 条
- [1] BURNET FM, 1959, CLONAL SELECTION THE
- [2] Quantitative hierarchical threat evaluation model for network security [J]. Ruan Jian Xue Bao, 2006, 4 (885-897): : 885 - 897
- [3] DING JT, 2005, J SICHUAN U ENG SCI, V36, P108
- [4] Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
- [5] Automatic high-performance reconstruction and recovery [J]. COMPUTER NETWORKS, 2007, 51 (05) : 1361 - 1377
- [6] An immunity based network security risk estimation [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (05): : 557 - 578
- [7] Li Tao, 2006, Chinese Journal of Computers, V29, P1515
- [10] Tackling the U3 trend with computer forensics [J]. DIGITAL INVESTIGATION, 2007, 4 (01) : 7 - 12