[1] 吳琮璠,民86,”資訊管理個案研究方法”,資訊管理學報,第四卷第一期,7-11頁。[2] 杜家麟,”資料挖掘在網際網路流量之分析研究”,靜宜大學資訊管理研究所碩士論文,民國89年6月。[3] 周鍾驥,”網路訊務量量測與特性研究”,中央員警大學資訊管理研究所碩士論文,民國89年6月。[4] 林育生,”以流量為基礎之網路分析系統”,國防大學中正理工學院電子工程研究所碩士論文,民國90年6月。[5] 翁瑞鋒,”網頁瀏覽者行為之泛化分群分析”,國立交通大學資訊科學研究所碩士論文,民國90年6月。[6] 張仕達,”從網路流量中發掘網際網路使用者之使用模式”,國立中山大學資訊管理研究所碩士論文,民國88年6月。[7] 張傑生,”以 flow 為基礎之網際網路流量量測分析”,國立交通大學資訊管理研究所碩士論文,民國86年6月。[8] 教育部統計處,”大專院校校別學生數“,http://www.edu.tw/statistics/service/s210190.xls
[9] 教育部統計處,”大學生時間運用調查結果摘要分析報告“,http://www.edu.tw/statistics/publish/time- arrange.doc
[10] 教育部資訊網,“台灣學術網路”, http://140.111.1.22/ tanet/
[11] 教育部電算中心,”國內網路流量統計分析”,http://nnst1.moe.edu.tw/
[12] 楊明宮,”網路流量監視器內封包過濾器之實現”,大同工學院資訊工程研究所碩士論文,民國87年6月。[13] 蕃薯藤數位科技‧開拓文教基金會,” 2002年台灣網路使用調查”,http://survey.yam.com/survey2002/ index.html,民92。
[14] 簡榮成,”廣域網路流量監測與分析工具之製作”,國立中正大學電機工程研究所碩士論文,民國88年6月。[15] Bruce A. Mah, “An Empirical Model of HTTP Network Traffic,” Proceedings of the IEEE INFOCOM''97, Vol.2, 1997, pp. 592-600.
[16] C. Barakat, P. thiran, G. Iannaccone, C. Diot, P. Owezarski, "A flow-based model for Internet backbone traffic," 2nd Internet Measurement Workshop, November 2002, pp. 35-47
[17] Cisco, “Cisco IOS NetFlow,” http://www.cisco.com/ warp/public/732/Tech/nmp/netflow/index.shtml。
[18] Dug Song, “dsniff,” http://naughty.monkey.org/ ~dugsong/dsniff/
[19] Helmut Hlavacs and Gabriele Kotsis, ”Modeling User Behavior: A Layered Approach, ” MASCOTS''99, IEEE Computer Society, 1999, pp. 218-225。
[20] Jon Postel, "Internet Protocol," Internet Request for Comments 791, September 1981.
[21] Jon Postel, "Transmission Control Protocol," Internet Request for Comments 793, September 1981.
[22] Jon Postel, J.K. Reynolds, “File Transfer Protocol,” Internet Request for Comments 959, October 1985.
[23] M. Roughan, A. Greenberg, C. Kalmanek, M. Rumsewicz, J. Yates, and Y. Zhang, “Experience in Measuring Backbone Traffic Variability: Models, Metrics, Measurements and Meaning,” Proc. ACM SIGCOMM Internet Measurement Workshop (IMW''2002), November 2002
[24] Maria-Dolores Cano, Josemaria Malgosa-Sanahuja, Fernando Cerdan, Joan Garcia-Haro, ”Internet Measurements and Data Study over the Regional Network Ciez@net, ” 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2001。
[25] MetaMachine , “eDonkey,” http://www.edonkey2000. com
[26] MySQL.com,“MySQL”,http://www.mysql.com/
[27] R. Rivest, “The MD4 Message Digest Algorithm,” ftp://ftp.rfc-editor.org/in-notes/rfc1320.txt
[28] Rafal Wojtczuk, “Libnids,” http://www.packetfactory. net/projects/libnids/, August 2002.
[29] Rigoberto Chinchilla, John Hoag, David Koonce, Hans Kruse, Shawn Ostermann, and Yufei Wang, "Characterization of Internet Traffic and User Classification: Foundations for the Next Generation of Network Emulation," Proceedings of the 10th International Conference on Telecommunication Systems, October 2002.
[30] Robin Sommer and Anja Feldmann, “NetFlow: Information Loss or Win?,” Proceedings of ACM SIGCOMM Internet Measurement Workshop (IMW''2002), November 2002
[31] S. Sarvotham, R. Riedi, and R. Baraniuk, "Connection-level analysis and modeling of network traffic," Rice Univ., July 2001
[32] Tim Berners-Lee, Roy T. Fielding, and Henrik Frystyk Nielsen, “Hypertext Transfer Protocol — HTTP/1.0,” Internet Request for Comments 1945, May 1996.
[33] W. Richard Stevens and Gary R. Wright, ”TCP/IP Illustrated, Volume 2,” Addison-Wesley Publishing Company, 1995.