2[1]Li En-lai.Law effectiveness of computer evidence[EB/OL].http://www.web-all.com.cn/wlfl/jsjzhjflx1.htm.
3[2]Robbins Judd. An explanation of computer forensics[EB/OL]. http://www.forensics.net/forensics.htm
4[3]Sallis P, Aakjaer A,MacDonellS. Software forensics:old methods for a new science[C].Software Engineering: Education and Practice, 1996,Proceedings. International Conference: 481 -485.
5[4]McGraw G, Morrisett G. Attacking malicious code: a report to the Infosec research council[J]. IEEE Software , Sept.-Oct.,2000, 17(5): 33-41.