›› 2013, Vol. 13 ›› Issue (10): 0-0.
• 信息网络安全 •
章翔凌;王欢
ZHANG Xiang-ling%WANG Huan
摘要: APT attack the biggest feature is used of application vulnerabilities to zero day attacks. In this paper based on application security theory, extended the whitelist technology, proposed assaciated with the application of a new access control model. Which