期刊文献+

电源

Power Sources
下载PDF
导出
出处 《今日电子》 2006年第8期117-119,共3页 Electronic Products
  • 相关文献

参考文献2

二级参考文献12

  • 1Gouda M G, Huang C T,McGuire T M. Hop integrity in computer networks [J]. IEEE/ACM Transactions on Networking, 2002, 10(3): 308-319.
  • 2Gouda M G. Elements of network protocol design [M]. New York: Wiley,1998.
  • 3Claffy K C. Internet traffic characterization [D]. San Diego,USA: Department of Computer Science and Engineering, University of California, 1994.
  • 4SongD.Fragroute[EB/OL].http:∥www.monkey.org/~dugsong/fragroute/,2004-02-15.
  • 5Ptacek T H, Newsham T N. Insertion, evasion, and denial of service: eluding network intrusion detection[R]. Technical Report, T2R-0Y6.Santa Clara, Canada:Secure Networks Inc, 1998.
  • 6Fyodor. Remote OS detection via TCP/IP stack finger printing[EB/OL]. http:∥www. insecure.org/nmap/nmap-fingerprinting-article.html,2004-02-21.
  • 7Wright G R, Stevens W R. TCP/IP illustrated vol 2: the implementation[M]. Boston:Addison-Wesley, 1995.
  • 8RFC791-1981, Internet Protocol[S].
  • 9Intel Press. IXP1200 network processor datasheet[EB/OL]. http:∥www.intel.com/design/network/datashts/27829810.pdf,2004-04-11.
  • 10Carlson B. Intel Internet exchange architecture and applications: a practical guide to IXP2XXX network processors[M]. New York:Intel Press, 2003.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部