期刊文献+

恶意代码及防护技术探讨 被引量:2

Study of technologies to prevent and eliminate malicious code
下载PDF
导出
摘要 文章分析了恶意代码的类型及特点,介绍了当前的防护技术,最后提出了新的防护技术思路。 The types and features of current technologies to prevent and malicious code is eliminate malicious analysed in this paper.Meanwhile the code is put forward here too. At the end a new idea of technologies is brought up.
作者 张燕 吴星
出处 《电脑与信息技术》 2006年第6期81-84,共4页 Computer and Information Technology
关键词 恶意代码 防护 注册表 脚本 ACTIVEX控件 JAVA APPLET malicious code prevent and eliminate registry script ActiveX control Java Applet
  • 相关文献

参考文献4

二级参考文献10

  • 1翟英 彭静.脚本漏洞大曝光[Z].四川:四川电子音像出版中心,2002..
  • 2徐海斌.走进“万花谷”[EB].http://www.pconline.com.cn/pcedu/soft/virus/10112/26206.html,.
  • 3Symantec Company. What is Norton AntiVirus Script Blocking Technology. http://service1.symantec.com/SUPPORT/nav.nsf/pfdocs/2001020912195106.
  • 4Burnet F M. The Clonal Selection Theory of Acquired Immunity. Vanderbilt University Press,1959.
  • 5Pietrek M. Windows 95 System Programming Secrets. IDG Books Worldwide,1996.
  • 6RichterJ 王建华译.Windows核心编程[M].北京:机械工业出版社,2000..
  • 7Crigney,Rubens A,Simpson W,et al. RFC 2138,Remot Authentication Dial in User Service(RADIUS)[J]. 1997-04-18
  • 8Herringshaw C.Detecting attacks[J].Computer 1997(12):16-17
  • 9Heberlein L T,Dias G V,Levitt K N,et al.A Network Security Monitor.[c]Proceeding of the IEEE Symposium on Security and Privacy,IEEE press, 1990
  • 10The Java Extensions Framework. JDK 1.2 Documentation,Sun Microsystems,Inc., 1998.http://java. sun.com/products/jdk/1.2/docs/guide/extensions

共引文献6

同被引文献6

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部