[1] 刘玲霞,王东霞,黄敏桓. 一个Web服务可信体系结构[J].计算机科学,2014,12(41):30-32.LIU ling?鄄xia,Wang Dong?鄄xia,Huang Min?鄄heng.Trustworthy Architecture for Web Services[J]. Computer science,2014,12(41):30-32.(in Chinese)[2] SABBARI M,ALIPOUR H S.A security model and its strategies for web services[J]. International Journal of computer Applications,2011,36(10):24-31.[3] JENSEN M, GRUSCHKA N, HERKENHONER R, et al. Soa And Web Services: New Technologies, New Standards - New Attacks[C]//2007. ECOWS '07. Fifth European Conference on. Web Services, 2007:35-44. [4] NILS Gruschka, Norbert Luttenberger.Protecting Web Services from DoS attacks by SOAP Message Validation [J].IFIP International Federation for Information processing 2006, 9(201):171-182,[5] DIEGO Z G,MARIA B F.Ontology-based Security Ploicies for supporting the management of Web Service Business Processes[C]//The IEEE international Conference on Semanitic computing.2008.[6] 杨晓晖. 一种基于信任度量的 Web 服务跨域访问控制模型[J].山东大学学报(理学版),2014,9(49):115-122.YANG Xiao-hui. A cross-domain access control model of Web service based on trust measurement[J].Journal of Shandong University(Natural Science),2014,9(49):115-122.(in Chinese)[7] 王传安. SCADA系统通信网中的高级持续性攻击检测方法[J].计算机科学与探索,2015,3(9):352-259.Wang Chuan?鄄an. Detection of Advanced Persistent Threats in SCADA Communication Network[J]. Journal of Frontiers of computer science and technology,2015,9(27):352-359.(in Chinese)[8] 翟东海.基于矩阵相似度的最佳样本块匹配算法及其在图像修复中的应用[J].计算机科学,2014,1(41):307-310.ZHAI Dong?鄄hai. Optimal Exemplar Matching Algorithm Based on Matrix Similarity and its Application in Image Inpainting[J]. Computer science,2014,1(41):307-310.(in Chinese)[9] 田新广.基于shell命令和多重行为模式挖掘的用户伪装攻击检测[J].计算机学报,2010,33(4):697-705.TIAN Xin?鄄guang. Masquerade detection based on shell commands and multiple behavior patter mining[J].Chinese Journal of computer,2010,33(4):697-705.(in Chinese)[10] 孙义,胡雨霁,黄皓. 基于序列比对的 SQL 注入攻击检测方法[J].计算机应用研究,2010,9(27):3525-3528.SUN YI,HU YU-JI,HUANG Hao. Method of defense SQL injection attacks based on sequence alignment [J]. Application Research of Computers,2010,9(27):3525:3528.(in Chinese)[11] 陈军.基于本体的 Web 服务攻击检测技术研究[J].计算机应用,2011,6(31):1515-1520.CHEN Jun. Research of Web Services attack detection based on ontology[J]. Journal of Computer Applications,2011,6(31):1515:1520.(in Chinese)[12] 杨晓峰. 基于文本聚类的网络攻击检测方法[J].智能系统学院,2014,1(9):1-7.YANG Xiaofeng. Text clustering based Web attack detection method[J]. CAAI Transactions on Intelligent Systems,2014,1(9):1-7.(in Chinese)