Studying and Classification of the Most Significant Malicious Software
Studying and Classification of the Most Significant Malicious Software
出处
《通讯和计算机(中英文版)》
2011年第1期17-22,共6页
Journal of Communication and Computer
Informatics, information security, virology, cyber threats
参考文献8
-
1A. Adamov, Computer Threats: Methods of Detection and Analysis, Kaspersky Lab, Moscow, 2009.
-
2Available online at: http://www.securelist.com.
-
3Infosecurity Magazine: Phishing and the Economics of E-crime, available online at: http://www.infosecurity-magazine.com, 2007.
-
4Z. Chen, C. Ji, A self-learning worm using importance scanning, in: ACM CCS Workshop on Rapid Malcode, 2005.
-
5C.C. Zou, W. Gong, D. Towsley, Code red worm propagation modeling and analysis, in: 9th ACM Conference on Computer and Communication Security, 2002.
-
6C. Shannon, D. Moore, The spread of the witty worm, IEEE Security and Privacy Magazine (2004).
-
7C. Zou, L. Gao, W. Gong, D. Towsley, Monitoring and early warning of internet worms, in: ACM Conference on Computer and Communications Security, 2003.
-
8M. Rajab, F. Monrose, A. Yerzis, Fast and evasive attacks: Highlighting the challenges ahead, in: 9th International Symposium on Recent Advances in Intrusion Detection, 2006.
-
1Windows发布9项安全更新[J].网管员世界,2005(11):77-78.
-
2光盘推介[J].数码时代,2006(12):154-157.
-
3微软发布首款杀毒软件 “火狐狸”挑战IE浏览器[J].软件指南,2005(2):4-4.
-
4卡巴斯基病毒播报[J].电脑迷,2005,0(18):67-67.
-
5邹鹏飞.微软恶意软件删除工具Software Removal Tool[J].电子乐园,2011(12):57-59.
-
6微软杀毒软件免费下载 针对恶性代码[J].现代计算机,2005(1):5-5.
-
7烽火台[J].计算机应用文摘,2005(19):101-101.
-
8来自微软的恶意软件删除工具 Software Removal Tool[J].电脑知识与技术(经验技巧),2012(1):17-17.
-
9Jinan Shen,Deqing Zou,Hai Jin,Kai Yang,Bin Yuan,Weiming Li.A Protective Mechanism for the Access Control System in the Virtual Domain[J].China Communications,2016,13(11):129-142. 被引量:1
-
10徐悦.Analytical Investigation on Computer Network Security System of Colleges and Universities[J].电脑知识与技术(过刊),2013,19(1X):266-268.