The Study Found that the Intelligent Mobile Phone Technology of Malicious Code

Article Preview

Abstract:

This paper studies the development trend of intelligent mobile phone, confirmed the necessity of research on intelligent mobile phone malicious code. Study on the detection technology, proposed intelligent mobile phone regular networks and random networks based on malicious code propagation model, propagation mechanism is studied. Set up a perfect malicious code discovery and defense system model, at different levels is put forward that different, prove the necessity of scanning algorithm and Semantic Detection Algorithm for eigenvalue. To improve the security of the whole communication network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

1263-1266

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Melissa Chau, Kiranjeet Kaur, Wong Teck Zhung. Asia\/Pacific ( Excluding Japan ) Mobile Phone 2011-2015 Forecast and Analysis[R]. IDC: IDC, 2011: 5-9.

Google Scholar

[2] temperature Rashomon, clock. The propagation model of mobile phone virus [J]. Application Research of computers, 2008, 28 ( 11 ): 2814-2815.

Google Scholar

[3] Ding Xuefeng, Ma Liang, Ding Xuesong. The spreading of mobile phone virus complex network theory model study based on [J]. science technology and engineering, 2009, 9 ( 11 ) . 2934-2935.

Google Scholar

[4] Hao Xiangdong, Wang Kai-yun. Computer engineering and design of typical malicious code and its detection technology of [J]., 2007, 28 ( 19 ): 4639-4661.

Google Scholar

[5] Qin Jia. Intelligent mobile terminal on [D]. Wuhan: Wuhan University of Technology Computer Institute. 2010: 27-34.

Google Scholar

[6] Tan Qing. A method of active defense executable malicious code and its realization [D]. Beijing: Beijing Jiaotong University, . 2007: 7-17.

Google Scholar

[7] Chen Zemao, Shen Changxiang. The malicious code mechanism and model of [J]. computer engineering and design, 2008, 29 ( 22 ): 5709-5711.

Google Scholar

[8] Wang Xiaojie, Wang Haifeng. Application of malicious code detection algorithm based on semantic [J]. based on computer system, 2009 ( 8 ): 103-105.

Google Scholar

[9] Jing Rui. Research and implementation of [D]. Chengdu malicious code detection system: University of Electronic Science and technology. 2010: 12-15.

Google Scholar

[10] Gui Jiaping, Zhou Yongkai, Shen Jun et al. Prevention of malicious code intelligent mobile phone [J]. information technology, 2009 ( 12 ): 9-12.

Google Scholar

[11] fresh permanent chrysanthemum. Intrusion detection [M]. Xi'an. Xi'an Electronic and Science University press, 2009: 23-27.

Google Scholar

[12] Jungsuk SONG etc. Cooperation of Intelligent Honeypots to Detect Unknown Malicious Codes[R]. WOMBAT Workshop on Information Security Threats Data Collection and Sharing. 2008: 31-33. 抱歉,系统响应超时,请稍后再试 · 支持中英、中日在线互译 · 支持网页翻译,在输入框输入网页地址即可 · 提供一键清空、复制功能、支持双语对照查看,使您体验更加流畅.

DOI: 10.1109/wistdcs.2008.10

Google Scholar