參考文獻 |
[中文部分]
[沈文吉 2001] 沈文吉,網路安全監控與攻擊行為之分析與實作,國立台灣大學資訊管理研究所碩士論文,民國90年。
[陳宗裕 2001] 陳宗裕,支援弱點稽核與入侵偵測之整合性後端資料庫設計研究,中原大學資訊工程學系碩士論文,民國90年
[劉其堅 2000] 劉其堅,多型性弱點資料庫設計與對應缺陷運用程式產生器製作,中原大學資訊工程學系碩士論文,民國89年
[劉榮修 2002] 劉榮修,一種網頁資訊擷取程式之自動化產生技術研發,國立中央大學資訊管理研究所碩士論文,民國91年
[英文部分]
[BGRV 1999] Laura Bright, Jean-Robert Gruser, Louiqa Raschid, Maria Esther Vidal, “A wrapper generation toolkit specify and construct wrappers for web accessible data sources (WebSources)”, International Journal of Computer Systems Science and Engineering, Vol. 14, No. 2, pp. 83-97, 1999.
[BLG 1998] Kurt D. Bollacker, Steve Lawrence, and C. Lee Giles, “Citeseer: An autonomous web agent for automatic retrieval and identification of interesting publications”, Proceedings of the 2nd International Conference on Autonomous Agents, ACM Press, pp.116-123, 1998.
[Cohen 1998] William W. Cohen, “A web-based Information system that reasons with structured collection of text”, Proceedings of the 2nd International Conference on Autonomous Agents (Agents’’98), pp. 400-407, 1998
[Eikvil 1999] Line Eikvil, “Information Extraction from world wide web –A Survey-“, Technical Report 945, Norwegian Computing Center, 1999.
[GS 1999] Xiaoying Gao, Leon Sterling, “Semi-Structured data extraction from heterogeneous sources”, Internet-based organisational memory and knowledge management, Part 2, Chapter 5, pages 83-102, The idea group Publisher, 1999.
[Kushmerick 2000] Nicholas Kushmerick, “Wrapper Induction: Efficiency and Expressiveness”, Artificial Intelligence, Vol. 118, Iss. 1-2, pp. 15-68, April 2000.
[LPT+ 1998] Ling Liu, Calton Pu, Wei Tang, David Buttler, John Biggs, Tong Zhou, Paul Benninghoff, Wei Han, “CQ: A Personalized Update Monitoring Toolkit”, In Proc.of the ACM SIGMODConf., pages 547--549, Seattle, 1998.
[PL 1998] Calton Pu, Ling Liu, “Update Monitoring: The CQ Project”, The 2nd International Conference on Worldwide Computing and Its Applications - WWCA’’98, Tsukuba, Japan, Lecture Notes in Computer Science, Vol. 1368, pp. 396-411, 1998
[RA 1998] Anderson, R. and Khattak, A. “The Use of Information Retrieval Techniques for Intrusion Detection”,. Web proceedings of the First International Workshop on Recent Advances in Intrusion Detection (RAID’’98), http://www.raid-symposium.org/raid98 , 1998
[RN 1998] ARAnand Rajaraman, Peter Norvig, “Virtual database technology: transforming the internet into a database”, IEEE Internet Computing, Vol. 2, Iss. 4, pp. 55-58, July-Aug. 1998
[Singh 1998] Narinder Singh, “Unifying heterogeneous information models”, Communication of ACM, Vol. 41, No. 5, pp. 37-44, May 1998
[YCO 2001] Jaeyoung Yang, Joongmin Choi, Heekuck Oh, “MORPHEUS:A customized comparison-shopping agent”, The 5th International Conference on Autonomous Agents (Agents-2001), Montreal, Canada, pp. 63-64, 2001
[YLC 2000] Jaeyoung Yang Eun-seok Lee, Joong-min Choi, “A Shopping Agent That Automatically Constructs Wrapper for Semi-Structured Online Vendors”, Lecture Notes in Computer Science, Vol. 1983, pp. 368-373, 2000
[相關網站]
[CERT] http://www.cert.org/
[CVE]Common Vulnerabilities and Exposures,CVE, http://cve.mitre.org/
[CVE技術文件] http://cve.mitre.org/docs/#tech
[ICAT] http://icat.nist.gov/icat.cfm
[ISS] http://xforce.iss.net/
[Pakemon] http://www.inas.mag.keio.ac.jp/ids/pakemon/
[SecuriTeam] http://www.securiteam.com
[SecurityFocus] http://www.securityfocus.com
[Snort] http://www.Snort.org/
[TWCERT] http://www.cert.org.tw/
[Whitehat] http://www.whitehat.org/ |