期刊文献+

计算机病毒及其发展趋势 被引量:15

Computer Virus and Its Development Trend
在线阅读 下载PDF
导出
摘要 通过对计算机病毒的基本属性以及结构的介绍,提高网络用户对计算机病毒的理解。分析和总结计算机病毒的发展趋势,介绍计算机病毒所采用的隐藏、多形性、社会工程、动态更新、混合攻击、数据关联、新型媒介、速度为王、恶意攻击、跨越平台等十大技术及发展方向,为科研技术人员和反病毒厂商防治计算机病毒提供有价值的参考。 This paper introduces the basic properties and structure of computer viruses,it can help network users to increase the understanding of computer viruses.And analyses and summarizes the development trends of computer viruses,introduces the top ten technical and developmental directions: stealth,polymorphism,social engineering,dynamic updates,blended attacks,associated data,new media,speed king,malware/trojan attacks,crossplatform.They provides valuable reference for scientific and technical personnel and anti-virus vendors to prevent computer viruses.
作者 肖英 邹福泰
出处 《计算机工程》 CAS CSCD 北大核心 2011年第11期149-151,共3页 Computer Engineering
基金 教育部科研基础设施示范基金资助项目(CNGI2008-106)
关键词 计算机病毒 病毒结构 病毒演变 病毒感染 computer virus virus structure virus evolution virus infection
  • 相关文献

参考文献6

  • 1Cohen F.Computer Viruses:Theory and Experiments[C] //Proc.of IMPTC'84.Toronto,Canada:[s.n.] ,1984.
  • 2Cohen F.On the implications of Computer Viruses and Methods of Defense[J].Computers & Security,1988,7(2):167-184.
  • 3Bontchev V.Are Good Computer Viruses Still a Bad Idea?[EB/OL].(2010-04-01).http://www.drsolomon.Com/ftp/papers.
  • 4Gordon S.Technologically Enabled Crime:Shifting Paradigms for the Year 2000[J].Computer and Security,1995,14(5):391-402.
  • 5Open Mail Relays Used to Deliver,Hybrisworm[EB/OL].(2001-02-20).http://www.cert.org/incident_notes/IN-2001-02.html.
  • 6刘俊,金聪,邓清华.无标度网络环境下E-mail病毒的传播模型[J].计算机工程,2009,35(21):131-133. 被引量:13

二级参考文献6

  • 1Kephart J O, White S R. Directed Graph Epidemiological Model of Computer Viruses[C]//Proc. of the IEEE Symposium on Security and Privacy. [S. l.]: IEEE Press, 199 : 343-359.
  • 2Hethcote H W. The Mathematics of Infectious Diseases[J]. SIAM Review, 2000, 42(4): 599-653.
  • 3Pastor-Satorras R, Vespignani A. Epidemic Dynamics in Finite Size Scale-free Networks[J]. Physical Review E, 2002, 65(3): 1-4.
  • 4Zou C C, Towsley D, Gong Weibo. E-mail Worm Modeling and Defense[C]//Proc. of the 13th International Conference on Computer Communications and Networks. Chicago, USA: [s. n.], 2004:11-13.
  • 5Xiong Jintao. ACT: Attachment China Tracing Scheme for E-mail Virus Detection and Control[C]//Proc. of the ACM Workshop on Rapid Malcode. Washington D. C., USA: [s. n.], 2004.
  • 6Chengyi Xia,Zhongxin Liu,Zengqiang Chen,Shiwen Sun,Zhuzhi Yuan.Epidemic spreading behavior in local-world evolving networks[J].Progress in Natural Science:Materials International,2008,18(6):763-768. 被引量:18

共引文献12

同被引文献68

引证文献15

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部