Solution to getting inter-independent characters used to network intrusion detection system
SHI Guang 1,3,HAO Ying 2,LU Xiu-lin 4,LIU Quan-fu 4,XU Long-wei 4,LEI Yu-guo 4
Computer Engineering and Applications . 2009, (2): 125 -127 .  DOI: 10.3778/j.issn.1002-8331.2009.02.036