相似文献/References:
[1]喻小光,陈维斌,潘孝铭.一种基于SOCKS5的Web安全代理技术[J].华侨大学学报(自然科学版),2007,28(3):268.[doi:10.3969/j.issn.1000-5013.2007.03.012]
YU Xiao-guang,CHEN Wei-bin,PAN Xiao-ming.The Research on the Technique of Web Security Proxy Based on SOCKS 5[J].Journal of Huaqiao University(Natural Science),2007,28(3):268.[doi:10.3969/j.issn.1000-5013.2007.03.012]
[2]马小雨,刘双红.改进Boyer匹配算法在Snort入侵检测中的应用[J].华侨大学学报(自然科学版),2016,37(2):168.[doi:10.11830/ISSN.1000-5013.2016.02.0168]
MA Xiaoyu,LIU Shuanghong.Application of Improved Boyer Matching Algorithmin Snort Intrusion Detection[J].Journal of Huaqiao University(Natural Science),2016,37(3):168.[doi:10.11830/ISSN.1000-5013.2016.02.0168]