共 30 条
[21]
Fuchs A.P., 2009, U MARYLAND UNPUB, V2
[22]
Keahey K, 2002, LECT NOTES COMPUT SC, V2536, P199
[23]
A Survey on Security for Mobile Devices
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2013, 15 (01)
:446-471
[24]
Benchmarking anomaly-based detection systems
[J].
DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS,
2000,
:623-630
[28]
Schiffman J., 2010, Proceedings 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2010), P95, DOI 10.1109/POLICY.2010.12
[29]
Shehab M., 2011, P 7 S US PRIV SEC, P11
[30]
Woongryul Jeon, 2011, Human Interface and the Management of Information. Interacting with Information. Proceedings Symposium on Human Interface 2011. Held as Part of HCI International 2011, P311, DOI 10.1007/978-3-642-21793-7_35