共 15 条
- [1] [Anonymous], 1992, MD5 MESSAGE DIGEST A
- [2] Hiding virtualization from attackers and malware [J]. IEEE SECURITY & PRIVACY, 2007, 5 (03) : 62 - 65
- [3] Chaney MichaelA., 2018, Where Is All My Relation?: The Poetics of Dave the Potter, P1
- [4] Christodorescu Mihai, 2003, USENIX SEC S
- [5] Damshenas M., 2013, INT J CYBER SECURITY, V2, P10
- [6] Daryabar F., 2012, CYB SEC CYB WARF DIG, P6064
- [7] Huang H. - D., 2011, INT AG IA 2011 IEEE, P18
- [8] Nataraj L., 2011, P 8 INT S VIS CYB SE, P1, DOI DOI 10.1145/2016904.2016908
- [9] Nataraj L, 2011, P 4 ACM WORKSH SEC A, P21, DOI [10.1145/2046684.2046689, DOI 10.1145/2046684.2046689]
- [10] RFID malware: Design principles and examples [J]. PERVASIVE AND MOBILE COMPUTING, 2006, 2 (04) : 405 - 426