期刊文献+

计算机病毒装备化关键技术研究

原文传递
导出
摘要 计算机病毒以其极强的破坏性和传染性,成了网络战研究的重点,并提出了病毒武器的概念。然而病毒的这些特征并不足以作为武器使用,本文提出对病毒进行改造,以适应装备化的需要。本文主要从计算机病毒的可控和跨平台两个方向进行了初步的探讨。
出处 《网络安全技术与应用》 2008年第3期66-68,共3页 Network Security Technology & Application
  • 相关文献

参考文献1

二级参考文献13

  • 1Spafford E H. The Internet Worm:Crisis and Aftermath. Communications of the ACM, 1989,32(6):678-687
  • 2Chen Xuan, Heidemann John. Detecting Early Worm Propagation through Packet Matching: [Technical Report ISI-TR-2004-585].USC/Information Sciences Institute,Feb. 2004
  • 3Bakos G,Berk V. Early Detection of Internet Worm Activity by Metering ICMP Destination Unreachable Messages. In: Proceedings of the SPIE Aerosense,2002
  • 4Singh S, Estan C, Varghese G, Savage S. The EarlyBird System for Real-time Detection of Unknown Worms: [Technical Report CS2003-0761]. UCSD, 2003
  • 5Gu RongJie, Xia DeLin, Yan PuLiu. An Adaptive Internet Backbone Malicious Activies Detection System Based on Frequent Pattern Mining. [J] GESTS International Transactions on Computer Science and Engineering., 2005,12: 41- 148
  • 6Cai Y,Cercone N, Han J. Attribute-Oriented Induction in relational databases. In: G. Priatetsky-Shapiro and W.J. Frawley, eds.Knowledge Discovery in Databases, Cambrige, MA: AAAI/MIT,213-228
  • 7Han J, Cai Y, Cercone N. Data-driven discovery of quantitative rules in relational databases. IEEE Trans. Knowledge and Data Engineering, 1993 : 29-40 .
  • 8Han J, Fu Y. Discovery of multiple-level association rules from large databases. In:Proc. 1995 Int. Conf. Very Large Data Bases(VLDB' 95), 1995
  • 9Han Jiawei,Kamber Micheline. Data Mining Concepts and Techniques.[M] Canada: Morgan Kaufmann publishers
  • 10Julish K, Dacier M. Mining Intrusion Detection Alarms for Actionable Knowledge. In: The 8th ACM Int Conf. on Knowledge Discovery and Data Mining, Edmonton, 2002

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部