参考文献/References:
[1] Xu X L,Wang R C,Xiao F.Malicious code passive propagation model and vaccine distribution model of P2P networks[J].Journal of Systems Engineering and Electronics, 2010,21(1):161-167.
[2] Pistolpete.杀毒软件[EB/OL].(2010-06-06)[2010-08-12].http://baike.baidu.com/view/33433.htm.
[3] Shevchenko A.The evolution of technologies used to detect malicious code [EB/OL].(2007-11-07)[2010-05-07].http://www.kaspersky.com.
[4] Kolter J,Maloof M.Learning to detect and classify malicious executables in the wild [J].Journal of Machine Learning Research,2006,7(12):2721-2744.
[5] 张小康.基于数据挖掘和机器学习的恶意代码检测技术研究[D].合肥:中国科学技术大学自动化学院,2009.
[6] 周瑞丽.基于专家系统的恶意代码检测[D].合肥:中国科学技术大学信息科学技术学院,2009.
[7] 陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348.
Chen Kang,Zheng Weimin.Cloud computing:system instances and current research[J].Journal of Software,2009,20(5):1337-1348.(in Chinese)
[8] 安安百科.云安全[EB/OL].(2009-12-20)[2010-07-28].http:/www.hudong.com/wiki/云安全.
[9] Kondakci S.Epidemic state analysis of computers under malware attacks[J].Simulation Modelling Practice and Theory,2008,16(5):571-584.
[10] Rohloff K,Baar T.Deterministic and stochastic models for the detection of random constant scanning worms[J].ACM Transactions on Modeling and Computer Simulation:Association for Computing Machinery,2008,18(2):1-24.
相似文献/References:
[1]周振吉,吴礼发,洪征,等.云计算环境下的虚拟机可信度量模型[J].东南大学学报(自然科学版),2014,44(1):45.[doi:10.3969/j.issn.1001-0505.2014.01.009]
Zhou Zhenji,Wu Lifa,Hong Zheng,et al.Trustworthiness measurement model of virtual machine for cloud computing[J].Journal of Southeast University (Natural Science Edition),2014,44(2):45.[doi:10.3969/j.issn.1001-0505.2014.01.009]
[2]周振吉,吴礼发,洪征,等.云计算环境下基于信任的虚拟机可信证明模型[J].东南大学学报(自然科学版),2015,45(1):31.[doi:10.3969/j.issn.1001-0505.2015.01.006]
Zhou Zhenji,Wu Lifa,Hong Zheng,et al.Trust based trustworthiness attestation model of virtual machines for cloud computing[J].Journal of Southeast University (Natural Science Edition),2015,45(2):31.[doi:10.3969/j.issn.1001-0505.2015.01.006]
[3]王旭阳,胡爱群,方昊.基于LWE的单层同态云计算方案[J].东南大学学报(自然科学版),2016,46(5):945.[doi:10.3969/j.issn.1001-0505.2016.05.008]
Wang Xuyang,Hu Aiqun,Fang Hao.Single-layer homographic cloud computing scheme based on LWE[J].Journal of Southeast University (Natural Science Edition),2016,46(2):945.[doi:10.3969/j.issn.1001-0505.2016.05.008]