[1] JIN Q, WU G, LI D. Research of anti-virus engine and automatic extraction of computer virus signatures[J]. Computer Engineering and Design, 2007, 28(24): 5863-5866.(金庆, 吴国新, 李丹. 反病毒引擎及特征码自动提取算法的研究[J]. 计算机工程与设计, 2007, 28(24): 5863-5866.) [2] LI H, LIU Z, QIN Z, et al. Technique of detecting malicious executables via behavioral and binary signatures[J]. Application Research of Computers, 2011, 28(3): 1127-1129.(李华, 刘智, 覃征, 等. 基于行为分析和特征码的恶意代码检测技术[J]. 计算机应用研究, 2011, 28(3): 1127-1129.) [3] XIE B, YU S. Application layer real-time proactive defense system based on application layer protocol analysis[J]. Chinese Journal of Computers, 2011, 34(3): 452-463.(谢柏林, 余顺争. 基于应用层协议分析的应用层实时主动防御系统[J]. 计算机学报, 2011, 34(3): 452-463.) [4] WANG F, ZHOU D. Design and implementation of active defense system based on white list[J]. Computer Engineering and Design, 2011, 32(7): 2241-2244.(汪锋, 周大水. 白名单主动防御系统的设计与实现[J]. 计算机工程与设计, 2011, 32(7): 2241-2244.) [5] CHEN X, WANG Z, REN J, et al. Novel virus active defense technique and detection algorithm[J]. Application Research of Computers, 2010, 27(6): 2338-2340.(陈顼颢, 王志英, 任江春, 等. 一种新型病毒主动防御技术与检测算法[J]. 计算机应用研究, 2010, 27(6): 2338-2340.) [6] ZHAO H, ZHOU C, ZHAI P, et al. Study of intrusion deception system based on network proactive defensive security model[J]. Journal of Air Force Engineering University: Natural Science Edition, 2010, 11(3): 76-79.(赵洪静, 周创明, 翟平利, 等. 基于网络主动防御安全模型的入侵诱骗系统[J]. 空军工程大学学报:自然科学版, 2010, 11(3): 76-79.) [7] TANG Z, ZHONG M, LI H, et al. Design of heuristic identification system for file transfer based on network data stream[J]. Computer Engineering and Design, 2011, 32(9): 2929-2933.(唐彰国, 钟明全, 李焕洲, 等. 基于数据流的启发式文件传输识别系统设计[J]. 计算机工程与设计, 2011, 32(9): 2929-2933.) [8] TANG Z, LI H, ZHONG M, et al. Heuristic trojan identification system based on network communication fingerprint[J]. Computer Engineering, 2011, 37(17): 119-121.(唐彰国, 李焕洲, 钟明全, 等. 基于网络通信指纹的启发式木马识别系统[J]. 计算机工程, 2011, 37(17): 119-121.) [9] ZENG X, ZHANG Z, ZHANG Z. Heuristic skill of computer virus analysis based on virtual machine[J]. Computer Applications and Software, 2005, 22(9): 125-126.(曾宪伟, 张智军, 张志. 基于虚拟机的启发式扫描反病毒技术[J]. 计算机应用与软件, 2005, 22(9): 125-126.) [10] LIU S, YANG X, CHEN J, et al. Design and implementation of tool for dynamical detecting program assertion[J]. Application Research of Computers, 2009, 26(11): 4140-4142.(刘树锟, 阳小华, 陈继锋, 等. 程序断言动态检测工具的设计与实现[J]. 计算机应用研究, 2009, 26(11): 4140-4142.) [11] ZHONG M, LI H, TANG Z, et al. Auto-detection system of suspicious file based on virtual machine technology[J]. Journal of Computer Applications, 2010, 30(12): 3357-3359.(钟明全, 李焕洲, 唐彰国, 等. 基于虚拟机技术的可疑文件自动检测系统[J]. 计算机应用, 2010, 30(12): 3357-3359.) [12] CHEN J, LI H, TANG Z, et al. Analysis on trojan operational mechanism and behavior[J]. Computer Security, 2009, 10: 108-110.(陈婧婧, 李焕洲, 唐彰国, 等. 木马运行机制及行为特征分析[J]. 计算机安全, 2009, 10: 108-110.) [13] LIU L. Research and application of the malicious code behavior analysis technology[D]. Hefei: Hefei University of Technology, 2009.(刘磊. 恶意代码行为分析技术研究与应用[D]. 合肥: 合肥工业大学, 2009.) [14] GAO Y, FAN M. Process analyzing method based on virtual machine[J]. Journal of Computer Applications, 2010, 30(5): 1327-1330.(高勇, 范明钰. 基于虚拟机技术的进程分析方法[J]. 计算机应用, 2010, 30(5): 1327-1330.) [15] LI H, CHEN J, ZHONG M, et al. Design of trojan horse detection model based on the behavioral library[J]. Journal of Sichuan Normal University: Natural Science, 2011, 34(1): 123-127.(李焕洲, 陈婧婧, 钟明全, 等. 基于行为特征库的木马检测模型设计[J]. 四川师范大学学报:自然科学版, 2011, 34(1): 123-127.) |