手机病毒,手机病毒研究相关参考文献清单

手机病毒研究相关参考文献清单 - 电脑安全 - 电脑教程网

手机病毒研究相关参考文献清单

日期:2007-03-08   荐:

手机病毒研究相关参考文献清单

[1] 彭君。融合环境下的终端安全技术。信息安全决策者大会,2006,北京。

[2] 计算机的发展历史,http://www.net130.com/2004/5-28/20344-4.html

[3] Neal Leavitt. Mobile Phones: The Next Frontier for Hackers. IEEE Computer, April 2005 (Vol. 38, No. 4),pp. 20-23.

[4] 王世安。手机病毒原理及防范。大连轻工业学院学报,第23卷第1 期,2004年3 月,P.74-76。

[5] 李恺,陈浩。GSM手机的病毒威胁。信息安全与通信保密,2005.7,P.226-228。

[6] Symantec. VBS.Timofonica. http://www.symantec.com/avcenter/venc/data/vbs.timofonica.html

[7] Symantec. SymbOS.Cabir. http://securityresponse.symantec.com/avcenter/venc/data/symbos.cabir.html

[8] Symantec. Trojan.Redbrowser.A. http://www.symantec.com/avcenter/venc/data/trojan.redbrowser.a.html

[9] Cyrus Peikari. Analyzing the Crossover Virus: The First PC to Windows Handheld Cross-infector. http://www.informit.com/articles/article.asp?p=458169

[10] Mikko Hypponen, Jarno Niemela. “F-Secure Virus Descriptions : Commwarrior.A”.7 March 2005. http://www.f-secure.com/v-descs/commwarrior.shtml

[11] “Viruslist – Backdoor.WinCE.Brador.a”. Viruslist. 05 Aug 2004. http://www.viruslist.com/en/viruslist.html?id=1984055

[12] Cyrus Peikari, Seth Fogie, Ratter/29A. Details Emerge on the First Windows Mobile Virus (Part 3 of 3). http://www.informit.com/articles/article.asp?p=337071

[13] Dan Ilet and Matt Hines. “Skulls program carries Cabir worm into phones”. Techrepublic. 30 Nov 2004. http://techrepublic.com.com/5100-22_11-5471004.html

[14] James W. Mickens, Brian D. Noble. Modeling Epidemic Spreading in Mobile Environments. WiSE’05, September 2, 2005, Cologne, Germany.

[15] Rocky Heckman. PDA Viruses - The New Frontier. http://www.rockyh.net/papers/pdaviruses.pdf

[16] Sang ho Kim, Choon Seong Leem. Security Threats and Their Countermeasures of Mobile Portable Computing Devices in Ubiquitous Computing Environments.ICCSA 2005, LNCS 3483, pp. 79 – 85, 2005.

[17] T.H. Smulders. Security threats of executing malicious applications on mobile phones. Master’s Thesis, Technische Universiteit Eindhoven, 2004.

[18] Chuanxiong Guo, Helen J. Wang, and Wenwu Zhu, “Smart-phone Attacks and Defenses,” in Proc. ACM SIGCOMM HotNets 2004, pp. 125-130.

[19] William Enck, Patrick Traynor, Patrick McDaniel, Thomas La Porta. Exploiting Open Functionality in SMSCapable Cellular Networks. CCS’05, November 7–11, 2005, Alexandria, Virginia, USA.

[20] Olivier Benoit, Nora Dabbous, Laurent Gauteron,et. al. Mobile Terminal Security. Cryptology ePrint Archive, Report 2004/158.

[21] Hui ZHENG, Dong LI, Zhuo GAO. An Epidemic Model of Mobile Phone Virus. http://worm.ccert.edu.cn/doc/spark/MobilePhoneVirus.pdf

[22] Dong LI, Tao GUO, Hui ZHENG. Modeling Mobile Phone Viruses Spreading by Bluetooth. http://www.paper.edu.cn/process/download.jsp?file=200604-149

标签: