3HAN B, LIU L. Based on Mobile Internet Application Security Sensitive CS-SVM Technology Research [C]//Proceedings of the 2012 Fifth International Symposium on Computational Intelligence and Design (ISCID). Vol. 2. USA: IEEE, 2012:160-164.
5TRONT J G, MARCHANY R C. Internet Security: Intrusion Detection and Prevention in Mobile Systems IC]//Proceedings of the 2007.40th Annual Hawaii International Conference on System Sciences, 2007. HICSS, USA: IEEE, 2007:162-165.
7ROHWER K, KROUT T. Multiple levels of security in support of highly mobile tactical internets-ELB ACTD IC]//Proceedings of the Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE Vol. 1. USA: IEEE, 2001 : 81-86.
8CARAGATA D, ASSAD S E, TUTANESCU t, et al. Security of mobile Internet access with UMTS/HSDPA/LTE [C]//Proceedings of the 2011 World Congress on Internet Security (WorldCIS), USA: IEEE, 2011:27- 276.
9ZHU W L, YU J P, WANG T. A security and privacy model for mobile RFID systems in the internet of things [C]//Proceedings of the 2012 IEEE 14th International Conference on Communication Technology (ICCT), USA: IEEE, 2012:726-727.