[1] |
WANG Xueqiang, LEI Lingguang, WANG Yuewu.A Review of Security Threats of Mobile Internet[J]. Netinfo Security, 2014, 14(9): 30-33.
|
|
王学强,雷灵光,王跃武.移动互联网安全威胁研究[J].信息网络安全,2014,14(9):30-33.
|
[2] |
WANG Hongkai, WANG Zhiqiang, GONG Xiaogang.Discussion of Mobile Internet Security Issues and Protection Measures[J]. Netinfo Security, 2014, 14(9): 207-210.
|
|
王红凯,王志强,龚小刚.移动互联网安全问题及防护措施探讨[J].信息网络安全,2014,14(9):207-210.
|
[3] |
CHEN Fuli.Information Security in the Age of Mobile Internet[J]. China Information Security, 2014(1): 29-31.
|
|
陈福莉. 移动互联网时代的信息安全[J].信息安全与通信保密,2014(1):29-31.
|
[4] |
REN Shuai, MU Dejun, ZHANG Tao, et al.Survey of Information Security Risk Assessment Methods[J]. China Information Security, 2009(2): 54-56.
|
|
任帅,慕德俊,张弢,等.信息安全风险评估方法研究[J].信息安全与通信保密,2009(2):54-56.
|
[5] |
YUAN Chunyang. Mobile Intelligent Terminal Application Software Security Detection[J]. China Information Security, 2012(10): 17, 22.
|
|
袁春阳.移动智能终端应用软件安全检测[J].信息安全与通信保密,2012(10):17,22.
|
[6] |
QING Sihan, ZENG Shansong, DU Chao.Research on Windows Security Baseline[J]. Netinfo Security, 2015, 15(3): 6-13.
|
|
卿斯汉,曾山松,杜超. Windows安全基线研究[J].信息网络安全,2015,15(3):6-13.
|