参考文献/References:
[ 1] Gong Jian, Lu Sheng , Wang Qian. Computer Networ k Security Co nspectus[ M] . First Edition. Published by Southeast Univ ersity, Nanjing: Song Zengmin, 2002, 1~ 290.
[ 2] Douglas E Comer , David L Stevens. Internetworking w ith TCPPIP Vol.Ⅲ : Client-Server Programming and Applications[M] . Second Edition, Prentice Hall Inc, 1998, 1~ 403.
[ 3] Charlie Kaufman, Radia Perlman, Mike Speciner. Netwo rk Security : Pr ivate Communication in a Public Wo rld[M] . First Edition. Prentice Hall Inc, 1995, 1~ 205.
[ 4] Liu Jianhang. The PKI based CA[ Degree dissertation] [ D] . Preserved in Nanjing: Southeast University . 1999.
[ 5] J Callas. OpenPGP Message Format[ DBPOL] . http:PPw ww. ietf. org , 1998P2002.
[ 6] B Feinstein. The Intrusion Detection Exchange Protocol ( IDXP) [ DBPOL] . http:PPwww . ietf. o rg, 2002P2002.
相似文献/References:
[1]李少凡,高尚兵,张莹莹,等.基于轻量化网络与嵌入式的分心行为协同检测系统[J].南京师范大学学报(工程技术版),2023,23(01):025.[doi:10.3969/j.issn.1672-1292.2023.01.004]
Li Shaofan,Gao Shangbing,Zhang Yingying,et al.Collaborative Detection System for Distraction Behavior Based on Lightweight Network and Embedded Platform[J].Journal of Nanjing Normal University(Engineering and Technology),2023,23(03):025.[doi:10.3969/j.issn.1672-1292.2023.01.004]