Viral attack to Internet banking applications
暂无分享,去创建一个
[1] Mark A. Ludwig. The Giant Black Book Of Computer Viruses , 1995 .
[2] Maria M. Pozzo,et al. An approach to containing computer viruses , 1987, Comput. Secur..
[3] Jeffrey O. Kephart,et al. Measuring and modeling computer virus prevalence , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Moti Yung,et al. Deniable password snatching: on the possibility of evasive electronic espionage , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[5] T. Fukuda,et al. Evolutionary transition on Virus-Evolutionary Genetic Algorithm , 1997, Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC '97).
[6] Moti Yung,et al. The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems , 1997, CRYPTO.
[7] Moti Yung,et al. Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.