[1] 戴祖峰,张玉清,胡予璞.安全扫描器研究综述[J].
计算机工程,2004,30(2):5-7,22
[2] MartinRoesch. Snort--Lightweight intrusion detection for networdks[A]. In Proceedings of the 13th Conference on Systems Administration Conference(LISA-99)[C]. Washington:USENIX,1999 229-238
[3] 赵天福,周丹平. Linux系统的防扫描技术研究[J]学术研究,2007, 06(38):192-194
[4]彭亚发,赵小兰.基于交换机防扫描技术网络安全的实现[J]电脑开发与应用,2011,12:63-64
[5]李航.统计学习方法 [M]. 北京:清华大学出版社, 2011
[6]ZahariaMatei. Spark: In-Memory Cluster Computing for Iterative and Interactive Applications. Invited Talk at NIPS 2011 Big Learning Workshop: Algorithms, Systems, and Tools for Learning at Scale.https://www.youtube.com/watch?v=qLvLg-sqxKc
[7]ZawodnyJeremy. Redis: Lightweight key/value Store That Goes the Extra Mile, Linux Magazine, August 31, 2009.http://www.linux-mag.com/cache/7496/1.html