[1]邓志鸿, 唐世渭,张铭, 等. Ontology研究综述 [J]. 北京大学学报, 2002, 38 (5): 730-738.
[2]ECKMANN S, VIGNA G, KEMMERER R. STATL: An Attack Language for State-based Intrusion Detection [J]. Journal of Computer Security, 2002,10(1/2):71 - 104.
[3]褚永刚, 宋传恒, 杨义先, 等. 入侵检测系统攻击语言研究 [J]. 信息安全与通信保密, 2003,21(4):40-42.
[4]FEIERTAG R, KAHN C, PORRAS P, et al. A Common Intrusion Specification Language [EB/OL]. http://www.isi.edu/ brian/cidf/drafts/language.txt,1999-06.
[5]MCGUINNESS DL, VAN HARMELEN F. OWL Web Ontology Language Overview, World Wide Web Consortium(W3C) recommendation [S].www.w3.org/TR/owl- features, 2003.
[6]NOY NF, MCGUINNESS DL. A Guide to Creating Your First Ontology [EB/OL]. http://protege.stanford.edu/publications/ontology_development/ontology101-noy-mcguinness.html, 2003.
[7]KAHN C, BOLINGER D, SCHACKENBERG D. Communication in the Common Intrusion Detection Framework v 0.7 [EB/OL]. http://www.isi.edu/ brian/cidf/drafts/communication.txt, 1998-06 .
[8]UNDERCOFFER J, JOSHI A, PINKSTON J. Modeling Computer Attacks: An Ontology for Intrusion Detection [A]. Proceedings of RAID 2003, LNCS 2820 [C], 2003.113-135.
|