4PAXSON V.Bro:a system for detecting network intruders in real-time[J].Computer Networks,1999,31:2 435-2 463.
5LORIS D,MARIO B,FULIVIO R,et al.Profiling and optimization of software-based network-analysis applications[C]//Proc of the 15th IEEE SBAC-PAD.Sao Paulo:2003,226 -234.
6IANNACCONE G,DIOT C,GRAHAM I,et al.Monitoring very high speed links[C]//Proc of ACM SIGCOMM Internet Measurement Workshop.Francisco:2001,267-271.
7Claffy K C,Braun H W,Polyzos G C.A parameterizable methodology for Internet traffic flow profiling[J].IEEE Journal on Selected Areas in Communications,1995,13(8):1 481 -1 494.
8WILLIAMSON C.Intemet traffic measurement[J].IEEE Internet Computing,2001,5(6):70-74.
9Bormann C, Ott J, Reichert C. Simple Conference Control Protocol [S]. Internet Draft, IETF, 1996-12
10Kausar N, Crowcroft J. An Architecture of Conference Control Functions [J]. Proc. of Photonics East, Boston, Massachusetts, 1999-09