A Generic Model for Trojan Horse Attacks Prevention and Handling
暂无分享,去创建一个
[1] Ghossoon. M. W. Al-Saadoon,et al. A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems , 2011, ArXiv.
[2] Harold W. Thimbleby,et al. A Framework for Modelling Trojans and Computer Virus Infection , 1998, Comput. J..
[3] Hannes Holm. A Large-Scale Study of the Time Required to Compromise a Computer System , 2014, IEEE Transactions on Dependable and Secure Computing.
[4] Peter Mell,et al. Guide to Malware Incident Prevention and Handling , 2005 .
[5] Qian Wang,et al. A Large-scale Trojans Control Model Based on Layered and P2P Structure , 2014, J. Softw..
[6] Laurence T. Yang,et al. Information security underlying transparent computing: Impacts, visions and challenges , 2010, Web Intell. Agent Syst..
[7] Zhenfang Zhu,et al. A Kind of Improved Detection and Prevention of Trojan Horse Based on Attack Tree , 2013, ICPCA/SWS.
[8] Hemraj Saini,et al. Defense Against Trojans Using Honeypots , 2012 .
[9] Ray Duncan. Trojan horse programs , 1986 .