相似文献/References:
[1]李伟.人脸识别算法在智能手机上的实现[J].计算机技术与发展,2008,(01):161.
LI Wei.Implementation of Face Identification in Intelligent Mobile Telephone[J].,2008,(01):161.
[2]左黎明.Windows内核恶意代码分析与检测技术研究[J].计算机技术与发展,2008,(09):145.
ZUO Li-ming.Research of Analysis and Detection of Malicious Code in Windows Kernel[J].,2008,(01):145.
[3]曹莹莹 王绍棣 王汝传 张伟.恶意代码传播效果的控制技术研究[J].计算机技术与发展,2010,(08):128.
CAO Ying-ying,WANG Shao-di,WANG Ru-chuan,et al.Research on Malware Code Propagation Effect Control Technology[J].,2010,(01):128.
[4]李君鹏 陈榕 闻英波.基于CAR构件的“Elastos”手机邮件系统设计和实现[J].计算机技术与发展,2008,(11):5.
LI Jun-peng,CHEN Rong,WEN Ying-bo.Design and Implementation of "Elastos"Smart Phone Email System Based on CAR[J].,2008,(01):5.
[5]张登银 赵晓强.基于M序列的恶意代码分片插入机制[J].计算机技术与发展,2010,(10):194.
ZHANG Deng-yin,ZHAO Xiao-qiang.Malicious Code Splitted and Inserted Based on M Sequence[J].,2010,(01):194.
[6]周健 马志媛 杨宸.研究智能手机轻量级访问控制的探讨[J].计算机技术与发展,2011,(11):227.
ZHOU Jian,MA Zhi-yuan,YANG Chen.Research on Access Control of Smart Phone[J].,2011,(01):227.
[7]顾亦然 李绪强.基于蓝牙的手机病毒传播模型的研究[J].计算机技术与发展,2012,(04):246.
GU Yi-ran,LI Xu-qiang.Epidemic Model Research of Mobile Virus Based on Bluetooth[J].,2012,(01):246.
[8]秦军,张海鹏,苏志和,等.一种基于二维行为特征的恶意代码识别方法[J].计算机技术与发展,2013,(06):143.
QIN Jun[],ZHANG Hai-peng[],SU Zhi-he[],et al.A Malicious Code Detection Method Based on Two-dimensional Behavior Characterization[J].,2013,(01):143.
[9]孙勇,陈小惠.WIFI与GPRS在远程医疗中的应用及研究[J].计算机技术与发展,2013,(08):200.
SUN Yong,CHEN Xiao-hui.Application and Research of WIFI and GPRS in Telemedicine System[J].,2013,(01):200.
[10]赵云程,慕德俊,戴航.双重恶意代码检测系统的设计与实现[J].计算机技术与发展,2013,(10):111.
ZHAO Yun-cheng,MU De-jun,DAI Hang.Design and Implementation of Dual Malware Detection System[J].,2013,(01):111.