[1]http://www.internetworldstats.com/stats.htm(2013.10.19)
[2]http://news.netcraft.com/archives/2013/10/02/october-2013-web-server-survey.html(2013.10.19)
[3]http://www.akamai.com/dl/documents/akamai_soti_q213.pdf?WT.mc_id=soti_Q213(2013.10.19)
[4]蔡碧展,“基於Hadoop平台的雲端基因架構”,碩士論文,國立高雄第一科技大學資訊管理系研究所,高雄,第30-37頁, 2010。[5]http://www.ithome.com.tw/itadm/article.php?c=61024(2013.10.19)
[6]http://www.emc.com/collateral/analyst-reports/idc-digital-universe-are-you-ready.pdf(2013.10.19)
[7]http://www.syscom.com.tw/ePaper_Content_EPArticledetail.aspx?id=140&EPID=168&j=5&HeaderName=%E7%A0%94%E7%99%BC%E6%96%B0%E8%A6%96%E7%95%8C(2013.10.19)
[8]http://www.ithome.com.tw/itadm/article.php?c=49410&s=4(2013.10.19)
[9]http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf(2012.12.28)
[10]http://www.gartner.com/it-glossary/cloud-computing/(2013.10.19)
[11]http://blogs.idc.com/ie/?p=190(2013.10.19)
[12]http://blogs.forrester.com/james_staten/09-10-14-cloud_defined_now_stop_cloudwashing(2013.10.19)
[13]https://developers.google.com/appengine/training/intro/whatiscc(2013.10.19)
[14]http://www-935.ibm.com/services/tw/gts/fue/article/2_1/2.html(2013.10.19)
[15]http://www.microsoft.com/taiwan/Mcloud/oacloud/default.aspx(2013.10.19)
[16]http://zh.wikipedia.org/wiki/%E9%9B%B2%E7%AB%AF%E9%81%8B%E7%AE%97(2013.10.19)
[17]http://www.cloudopenlab.org.tw/ccipo_industryDefinition.do(2013.10.19)
[18]http://zh.wikipedia.org/wiki/Windows_Azure_Platform_AppFabric(2013.10.19)
[19]http://www.openfoundry.org/tw/resourcecatalog/Cloud-Computing/Infrastructure-Layer/Computing/Amazon-EC2(2013.10.19)
[20]http://www.moneydj.com/kmdj/wiki/wikiviewer.aspx?keyid=b2a16b54-77ee-4a1d-8feb-a3d0366e55c8(2013.10.20)
[21]http://hadoop.apache.org/(2013.10.20)
[22]http://hadoop.apache.org/docs/r0.18.0/hdfs_design.pdf(2013.10.19)
[23]Chang Fay, Dean Jeffrey, Ghemawat Sanjay, Hsieh Wilson C., Wallach Deborah A., Burrows Mike, Chandra Tushar, Fikes Andrew, Gruber Robert E., “Bigtable: a Distributed Storage System for Structured Data,” Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, Seattle, Vol. 26, No. 2, pp. 205-218, 2006.
[24]Ghemawat Sanjay, Gobioff Howard, Leung Shun-Tak, “The Google File System,” Proceedings of the nineteenth ACM symposium on Operating systems principles, New York, Vol. 37, No. 5, pp. 29-43, 2003.
[25]Dean Jeffrey, Ghemawat Sanjay, “MapReduce: Simplified Data Processing on Large Clusters,” Proceedings of the 6th Symposium on Operating System Design and Implementation, San Francisco, Vol. 51, No. 1, pp.137-149, 2004.
[26]http://www.sans.org/resources/idfaq/(2012.1.7)
[27]Denning Dorothy E., “An Intrusion Detection Model” , Proceeding of the IEEE Transactions On Software Engineering, Piscataway, Vol. 13, No. 2, pp. 222-232, 1987.
[28]黃培生、楊中皇,“結合入侵偵測和蜜罐之分散式預警系統的設計與實現”,碩士論文,師範大學資訊教育研究所,高雄,第10-13頁,2009。[29]Frédéric Cuppens, and Alexandre Miège, “Alert Correlation in a Cooperative Intrusion Detection Framework,” Proceeding of the IEEE Symposium on Research in Security and Privacy, Oakland, Vol. 26, No. 2, pp. 202-215, 2002.
[30]http://www.cert.org.tw/document/column/show.php?key=85(2012.1.7)
[31]楊景隆,“運用網路誘捕系統對入侵行為之分析與實作”,碩士論文,大葉大學資訊管理學系碩士班,彰化,第5-8頁,2006。
[32]http://www.snort.org(2012.1.7)
[33]吳育庭,“網路安全防護之研究”,碩士論文,國防大學理工學院資訊工程學系碩士班,桃園,第9-19頁,2012。[34]http://www.graphviz.org/(2013.10.8)
[35]http://www.netadmin.com.tw/article_content.aspx?sn=1305300001(2013.10.8)
[36]Yang Shun-Fa, Chen Wei-Yu, Wang Yao-Tsung, “ICAS: an Inter-VM IDS Log Cloud Analysis System”, Proceeding of the IEEE International Conference on Cloud Computing and Intelligence Systems, Beijing, pp. 285-289, 2011.
[37]白浩泉,姚立紅,陸松年,“基於MapReduce平行運算模型的警報聚合演算法”,信息技術,第四期,第85-88頁,2011。
[38]http://trac.nchc.org.tw/cloud/wiki/Talk(2013.10.22)
[39]http://trac.nchc.org.tw/cloud(2013.10.23)
[40]Xu Guanghui, Xu Feng, Ma Hongxu, “ Deploying and Researching Hadoop in Virtual Machines,” Proceeding of the IEEE International Conference on Automation and Logistics, Zhengzhou, pp. 395-399, 2012.