1.D. Johnson, A. Menezes and S. Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” International Journal of Information Security, Vol. 1, Issue 1, Springer-Verlag, p.36-63, 2001.
2.CERT Coordination Center, http://www.cert.org/stats/cert_stats.html, 2004.
3.http://www.w3.org/XML/
4.RealSecure Network Sensor, http://www.iss.net/
5.Snort, http://www.snort.org/
6.Tener, W-T, Discovery, “An Expert System in the Commercial Data Security Environment,” Proceeding of the fourth IFIP TC 11 International Conference on computer security, North-Holland, p.261-268, Dec. 1986.
7.Microsoft, http://msdn.microsoft.com/library/cht/default.asp?url=/libr ary/CHT/cpguide/html/cpconwebservicesinfrastructure.asp
8.R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital 2Signature and Public Key Cryptosystems,” Communications of the ACM, Vol.21, No.2, p.120-126, Feb. 1978.
9.T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Advances in Cryptology: Proceedings of CRYPTO ’84, Springer-Verlag, p.10-18, 1985.
10.C. P. Schnorr, “Efficient Signature Generation for Smart Cards,” Advances in Cryptology – CRYPTO ’89 Proceedings, Springer-Verlag, p. 239-252, 1990.
11.C. P. Schnorr, “Efficient Signature Generation for Smart Cards,” Journal of Cryptology, Vol. 4, No. 3, p.161-174, 1991.
12.National Institute of Standards and Technology, Digital Signature Standard, FIPS Publication 180-1, 1995.
13.D. Johnson, A. Menezes and S. Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” International Journal of Information Security, Vol. 1,Issue 1, Springer-Verlag, p.36-63, 2001.
14.S. Vanstone, “Response to NIST’s Proposal,” Communications of the ACM, Vol.35, p.50-52, Jul. 1992.
15.William J. Caelli, Edward P. Dawson and Scott A. Rea, “PKI, Elliptic Curv-e Cryptography, and Digital Signatures,” Computers & Security, Vol. 18, Issue 1, p.47-66, 1999.
16.http://www.thewindow.to/bs7799/
17.Peng Ning, Yun Cui and Douglas S. Reeves, “Constructing attack scenarios through correlation of intrusion alerts,” In Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, 2002.
18.Sang-Jun Han; Sung-Bae Cho,” Rule-based integration of multiple measure-models for effective intrusion detection”, Systems, Man and Cybernetics, 2003. IEEE International Conference on ,Volume: 1 , p.120 – 125, 2003.
19.Magnus Almgren,Ulf Lindqvist,” Application-Integrated Data Collection for Security Monitoring”, Recent Advances in Intrusion Detection (RAID 2001).Springer, Davis, California, p.22–36, 2001.
20.李駿偉、田筱榮、黃世坤,入侵偵測分析方法評估與比較 Communiciation of the CCISA 資訊安全通訊,第九卷,第一期,頁8~20,民93年。
21.周志明,基於網路內容的網路入侵偵測系統,新竹,國立交通大學資訊科學系碩士論文,民90年。22.林佳霖,資料探勘在聯合防禦上的應用,新竹,國立清華大學資訊工程學系碩士論文,民91年。23.財團法人資訊工業策進會,http://www.iii.org.tw,民92年。
24.張兆祥,資料挖掘在入侵偵測上的應用,桃園,元智大學工業工程與管理學系碩士論文,民93年。25.郭尚君、郭慧琦,XML技術實務,台北,文魁,第四~八章,民91年。
26.陳明佐,植基於階層式規則之入侵偵測系統,台中,逢甲大學資訊工程學系碩士論文,民91年。27.黃玉菁,以網路服務為架構之入侵偵測系統研究,台北,世新大學資訊管理學系碩士論文,民93年。28.賴峙樺,以橢圓曲線為基礎之簽密法的研究,台北,淡江大學資訊工程學系碩士論文,民92年。29.簡士偉,可擴充性主動式網路入侵防禦系統架構之研究,新竹,國立清華大學資訊工程學系,民91年。30.鍾宜勳,Heap緩衝區溢位攻擊防治之研究,台中,逢甲大學資訊工程學系碩士論文,民92年。31.http://www.thg.com.tw/article_000088901.html
32.http://taiwan.cnet.com/news/hardware/0,2000064553,2009158 5,00.htm
33.劉得民,網路資訊安全實務,民93年。
34.陳鴻吉,運用異質資訊提升入侵警報正確率,桃園,中原大學資訊工程研究所碩士論文,民94年。