Mechanism and defense on malicious code
暂无分享,去创建一个
[1] Ulf Grenander,et al. General Pattern Theory: A Mathematical Study of Regular Structures , 1993 .
[2] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[3] Wendy M. Grossman,et al. Inside the Mind of Dark Avenger , 1997 .
[4] Roger A. Grimes,et al. Malicious Mobile Code: Virus Protection for Windows , 2001 .
[5] Tian Chang. Computational Model of Computer Virus , 2001 .
[6] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[7] David Wagner,et al. Janus: an Approach for Confinement of Untrusted Applications , 1999 .