|
[1] 王義智, “日本資訊安全市場發展趨勢,” 台灣安全產業電子報, 2007 [2] L.Garber, “Instant Messaging: A New Target for Hackers,” IEEE Computer Society members, Volume 38 Issue 7, CA, USA, pp 20-23, 2005 [3] 鄭進興、林敬皇、沈志昌、林宜隆, “電腦鑑識方法與程序之研究,” TANET 2003台灣網際網路研討會論文, 2005 [4] 彭元、黃皚昌、莊軍蓮, “國內即時通訊軟件的安全脆弱性分析,” 廣西科學院學報, 2005 [5] H.Zhenyu, L.Zaiqiang, S.Purui, and F.Dengguo, “Blocking MSN: A Case Study of Preventing the Abuse of IM,”2005 Asia-Pacific Conference on Communications, Perth, Western Australia, pp 3-5, 2005 [6] Hypothetic, MSN Messenger Protocol, http://www.hypothetic.org/docs/msn/ [7] Linux Die, Brtcl, http://linux.die.net/man/8/brctl/ [8] Tcpdump, tcpdump/libpcap, http://www.tcpdump.org/ [9] Netfilter, netfilter/iptables, http://www.netfilter.org/ [10] Linux, Linux, http://www.linux.org.tw/ [11] Knowplace, Netfilter, http://www.knowplace.org/netfilter/syntax.html [12] Debian, http://www.us.debian.org/ [13] Ubuntu, http://www.ubuntu.com/ [14] Knoppix, http://www.knoppix.net/ [15] Linspire, http://www.linspire.com/ [16] Xandros, http://www.xandros.com/ [17] Helsinki, Linus Torvalds, http://www.cs.helsinki.fi/u/torvalds/ [18] Kernel, http://www.kernel.org/ [19] Intel, Multi-Processor, http://www.intel.com/design/pentium/datashts/242016.htm [20] USB, http://www.usb.org/ [21] PCMCIA, http://www.pcmcia.org/ [22] J.Pranevich, “Kernel korner: Linux 2.4 spotlight: ISA plug and play,” Linux Journal, Volume 2000 Issue 70, Seattle, WA, 2000 [23] 林彥明, “寶刀SLES 9,RHEL 4不出,誰與爭鋒!,” 恆逸資訊講師講稿,新竹,台灣, 2005 [24] D.Koufaty and Deborah T.Marr, “Hyperthreading technology in the netburst microarchitecture,” HYPERTHREADING TECHNOLOGY, Volume 23 Issue 2, pp 56-65, Berkeley, CA, 2003
[25] Patricia McDermott-Wells, “What is Bluetooth?,” Potentials, IEEE , Volume 23 Issue 5, pp 33-35, Miami , FL, 2004 [26] Serialata, SATA, http://www.serialata.org/ [27] G.Kroah-Hartman, “Kernel korner: udev—persistent device naming in user space,” Linux Jurnal, Volume 2004 Issue 122, Seattle, WA, 2004 [28] Randolph Y. Wang and Thomas E. Anderson, “xFS: A Wide Area Mass Storage File System,” Workstation Operating Systems, 1993. Proceedings., Fourth Workshop on, pp 71-78, Berkely, CA, 1993 [29] A. Barczyk, D. Bortolotti, A. Carbone, J.-P. Dufey, D. Galli, B. Gaidioz, D. Gregori, B. Jost, U. Marconi, N. Neufeld, G. Peco, and V. Vagnoni, “High Rate Packets Transmission on Ethernet LAN Using Commodity Hardware,” Real Time Conference, 2005. 14th IEEE-NPSS, Yorktown, NY, 2005 [30] J.Liu, A.Mamidala, A.Vishnu and Dhabaleswar K. Panda, “Evaluating InfiniBand Performance with PCI Express,” IEEE Computer Society, Volume 25 Issue 1, pp 20-29,Yorktown, NY, 2005 [31] 陳永昇, “NetFilter簡介,” Redhat Linux 技術應用系列研討會 Introduction to Linux Netfilter補充資料, 新竹,台灣, 2002 [32] Die, Tcpdump, http://linux.die.net/man/8/tcpdump [33] A.Bagri, M.Mundhra, A.Pathak and B.Raman, Dept. of Computer Science and Engg. Indian Institute of Technology Kanpur Kanpur, India and Currently at Purdue University, USA, “WiFiDump - A Novel Architecture for Wireless Network Debugging,” Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on, pp 1-8, Kanpur, India, 2007 [34] IEEE802.3, http://ieee802.org/3/ [35] C.Benvenuti, “UNDERSTANDING LINUX NETWORK INTERNALS,” O’REILLY, 2005 [36] Data Link Layer, http://www.linfo.org/data_link_layer.html [37] James T. Yu, “Performance Evaluation of Linux Bridge,” Telecommunications System Management Conference 2004, Louisville, Kentucky, 2004 [38] A.Salkever, “The Big Guys Latch Onto Linux,” BusinessWeek, March 2003. [39] F.Fuentes and Dulal C.Kar, “ETHEREAL VS. TCPDUMP: A COMPARATIVE STUDY ON PACKET SNIFFING TOOLS FOR EDUCATIONAL PURPOSE,” Journal of Computing Sciences in Colleges, Volume 20 Issue 4, pp 169-176, Corpus Christi, TX, 2005 [40] V.Visoottiviseth and N.Bureenok, “Performance Comparison of ISATAP Implementations on FreeBSD, RedHat, and Windows 2003,” 22nd International Conference on Advanced Information Networking and Applications, pp 547-552, Bangkok, Thailand, 2008 [41] NLANR, iperf, http://dast.nlaner.net/Projects/Iperf/, 2008 [42] 古立其、李慧蘭、陳敏, “建置於TWAREN之防災專屬網路架構設計及效能品質量測,” TANET 2007台灣網際網路研討會論文, 台灣, 2007 [43] Ethereal, http://www.ethereal.com/ [44] Ethereal, Editcap, http://www.ethereal.com/docs/man-pages/editcap.1.html [45] 張智晴 林盈達,“網路的攻擊與防護機制,”網路通訊 115期, 新竹, 台灣, 2001 [46] A.Chame, “PCI Bus In High Speed I/O Systems Applications,” Aerospace Conference, 1998. Proceedings., IEEE, Volume 4 Issue 4, pp 505-514, Sunnyvale, CA, 1998 [47] Z.Xiao, L.Guo, and J.Tracey, “Understanding Instant Messaging Traffic Characteristics,” 27th International Conference on Distributed Computing Systems (ICDCS'07), NY , USA, pp 51-51, 2007
|