期刊文献+

2010年我国计算机和移动终端病毒疫情调查技术分析报告 被引量:3

Technical Analysis of Chinese Computer and the Mobile Terminal Malware Epidemic Situation Survey in 2010
下载PDF
导出
摘要 文章对公安部组织的2010年国内计算机和移动终端病毒疫情调查数据进行了详细的技术分析,并在此基础上提出了中国当前计算机病毒的防治策略,特别是2010年首次开展了对移动终端病毒情况进行调查和分析,对保障我国移动互联网的安全发展具有重要意义。 This paper has a detailed technical analysis of the data of Chinese computer and the mobile terminal malware epidemic situation survey in 2010, which is organized by the Ministry of Public Security. The strategy against malware is proposed based on the survey data.. Especially it is the first time to launch on a mobile terminal malware case for investigation and analysis this year, which has important significance to ensure the security development of Chinese mobile internet.
出处 《信息网络安全》 2011年第9期70-73,共4页 Netinfo Security
基金 国家高技术研究发展计划(863计划)资助项目(2011AA010702)
关键词 计算机病毒 移动终端 疫情 调查 virus mobile terminal epidemic situation survey
  • 相关文献

参考文献2

  • 1张健等.2009年我国计算机病毒疫情调查技术分析报告[R].天津:国家计算机病毒应急处理中心,2009.
  • 2张健等.2008年我国计算机病毒疫情调查技术分析报告[R].天津:国家计算机病毒应急处理中心,2008.

同被引文献42

  • 1Szor P. The art of computer virus research and de- fense[M]. Texas, USA: Pearson Education, 2005.
  • 2金山网络.2011-2012中国互联网安全研究报告[EB/OL].(2012-2-17).[2012-10-12].http://www.ijinshan.com/news/20120217001.shtml.
  • 3Bergeron J, Debbabi M, Desharnais J, et al. Static detection of malicious code in executable programs [DB/OL]. (2004-07-08). [2011-05-12].
  • 4Christodoreseu M, Jha S, Seshia S A, etal. Seman- tics-aware malware detection[C]//Security and Pri- vacy. Symposium :IEEE, 2005.
  • 5Bilar D. Opcodes as predictor for malware I-J]. Inter- national Journal of Electronic Security and Digital Forensics, 2007,1(2): 156.
  • 6Santos I, Brezo F, Nieves J, etal. Idea: Opcode-se- quence-based malware detection [M] //Engineering Secure Software and Systems. Berlin .Springer Ber- lin Heidelberg, 2010.
  • 7Moskovitch R, Feher C, Tzachar N, etal. Unknown malcode detection using OPCODE representation[M] // Intelligence and Security Informatics. Berlin. Springer Berlin Heidelberg, 2008.
  • 8Siddiqui M, Wang M C, Lee J. Data mining methods for malware detection using instruction sequences[C] ffProeeeding of AIA '08 Proceedings of the 26th IASTED International Conference on Artificial Intel- ligence and Applications. USA: ACTA Press, 2008.
  • 9Santos I, Brezo F, Ugarte-Pedrero X, etal. Opcode sequences as representation of executables for data- mining-based unknown malware detection [J]. In- formation Sciences, 2011, 231: 64.
  • 10Karim M E, Walenstein A, Lakhotia A, etal. Mal- ware phylogeny generation using permutations of code[J]. Computer Virology, 2005,1(1) . 13.

引证文献3

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部