[1]
Melissa Chau, Kiranjeet Kaur, Wong Teck Zhung. Asia\/Pacific ( Excluding Japan ) Mobile Phone 2011-2015 Forecast and Analysis[R]. IDC: IDC, 2011: 5-9.
Google Scholar
[2]
temperature Rashomon, clock. The propagation model of mobile phone virus [J]. Application Research of computers, 2008, 28 ( 11 ): 2814-2815.
Google Scholar
[3]
Ding Xuefeng, Ma Liang, Ding Xuesong. The spreading of mobile phone virus complex network theory model study based on [J]. science technology and engineering, 2009, 9 ( 11 ) . 2934-2935.
Google Scholar
[4]
Hao Xiangdong, Wang Kai-yun. Computer engineering and design of typical malicious code and its detection technology of [J]., 2007, 28 ( 19 ): 4639-4661.
Google Scholar
[5]
Qin Jia. Intelligent mobile terminal on [D]. Wuhan: Wuhan University of Technology Computer Institute. 2010: 27-34.
Google Scholar
[6]
Tan Qing. A method of active defense executable malicious code and its realization [D]. Beijing: Beijing Jiaotong University, . 2007: 7-17.
Google Scholar
[7]
Chen Zemao, Shen Changxiang. The malicious code mechanism and model of [J]. computer engineering and design, 2008, 29 ( 22 ): 5709-5711.
Google Scholar
[8]
Wang Xiaojie, Wang Haifeng. Application of malicious code detection algorithm based on semantic [J]. based on computer system, 2009 ( 8 ): 103-105.
Google Scholar
[9]
Jing Rui. Research and implementation of [D]. Chengdu malicious code detection system: University of Electronic Science and technology. 2010: 12-15.
Google Scholar
[10]
Gui Jiaping, Zhou Yongkai, Shen Jun et al. Prevention of malicious code intelligent mobile phone [J]. information technology, 2009 ( 12 ): 9-12.
Google Scholar
[11]
fresh permanent chrysanthemum. Intrusion detection [M]. Xi'an. Xi'an Electronic and Science University press, 2009: 23-27.
Google Scholar
[12]
Jungsuk SONG etc. Cooperation of Intelligent Honeypots to Detect Unknown Malicious Codes[R]. WOMBAT Workshop on Information Security Threats Data Collection and Sharing. 2008: 31-33. 抱歉,系统响应超时,请稍后再试 · 支持中英、中日在线互译 · 支持网页翻译,在输入框输入网页地址即可 · 提供一键清空、复制功能、支持双语对照查看,使您体验更加流畅.
DOI: 10.1109/wistdcs.2008.10
Google Scholar