8Andrew Honig, Andrew Howard, Eleazar Eskin. Adaptive model generation: an architecture for deployment of data mining-based intrusion detection systems[C]. Data Mining for Security Applications. Kluwer 2002.
9Patarin J. Improved security bounds for pseudo-random permutations[C]. 4th ACM Conference on Computer and Communications Security, 1997,142-150.
10Andrew S. Tandnbaum. Computer Networks [M].Pearson Education, Inc., 2003