4Jeffrey W.Seifert, "Data mining and the search for security: Challenges forconnecting the dots and databases" Congressional Research Service, Library of Congress, Washington, DC 20540 - 7450, USA Available online 28 October, 2004.
二级参考文献2
1[1]Wang X, Reeves D S. Sleepy Watermark Tracing: An Active Net work - based Intrusion Response Framework. IFIP/Sec' 01, Paris,France, 2001.
2[2]Snoeren A C, Partridge C, Sanchez L A, etal Hash - Based IP Traceback. BBN Technical Memo 1284, February 12, 2001.