信息网络安全 ›› 2015, Vol. 15 ›› Issue (9): 287-291.doi: 10.3969/j.issn.1671-1122.2015.09.064
CHEN Xiao-chun, SUN Liang, ZHAO Li-na
Received:
2015-07-15
Online:
2015-09-01
CLC Number:
CHEN Xiao-chun, SUN Liang, ZHAO Li-na. Research and Applicationon on Terminals Management Security System Based on Firmware[J]. 信息网络安全, 2015, 15(9): 287-291.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.09.064
[1] 池亚平,许盛伟,方勇. BIOS木马机理分析与防护[J]. 计算机工程,2011,37(13):122-124. [2] 李巍,李丽辉,李佳,等. 远控型木马通信三阶段流量行为特征分析[J]. 信息网络安全,2015,(5):10-15. [3] 杨培,吴灏,金然. BIOS安全防护技术研究[J]. 计算机工程与设计,2008,29(15): 3840-3842. [4] 郝增帅,郭荣华,文伟平,等. 基于特征分析和行为监控的未知木马检测系统研究与实现[J]. 信息网络安全,2015,(2):57-65. [5] 糜旗,宗俊珺,徐超. BIOS Rootkit的实现技术研究[J]. 计算机与现代化,2013,(11):174-176. [6] 周振柳,李铭,翟伟斌,等. 基于UEFI的可信BIOS研究与实现[J]. 计算机工程,2008,34(8):174-176. [7] 王春新,李信,于然,等. 电力移动智能终端安全技术研究[J]. 信息网络安全,2014,(4):70-77. [8] 陈菊,谭良. 一个基于进程保护的可信终端模型[J]. 计算机科学,2011,(4):115-117. [9] 宋远峰,刘新. 基于RFID的定位系统综述[J]. 数字通信,2013,(4):9-13. [10] 夏戈明,史立哲,周文,等. 轻量级RFID双向通信认证协议优化方案[J]. 信息网络安全,2014,(2):58-62. [11] 陈瑞鑫,邹传云. 有源RFID定位系统设计与实现[J]. 电子技术应用,2010,(10):114-116. [12] 孙玉伟,童新海,张林惠,等. 云桌面中USB设备重定向技术研究[J]. 信息网络安全,2015,(4):78-85. |
[1] | LIU Jianwei, HAN Yiran, LIU Bin, YU Beiyuan. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[2] | JIANG Jinfang, HAN Guangjie. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[3] | CHEN Lu, SUN Yajie, ZHANG Liqiang, CHEN Yun. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[4] | GUO Chun, CHEN Changqing, SHEN Guowei, JIANG Chaohui. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[5] | DONG Xiaoli, SHANG Shuai, CHEN Jie. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[6] | WANG Rong, MA Chunguang, WU Peng. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | FU Zhizhou, WANG Liming, TANG Ding, ZHANG Shuguang. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[8] | DU Yifeng, GUO Yuanbo. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[9] | BIAN Lingyu, ZHANG Linlin, ZHAO Kai, SHI Fei. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[10] | LIU Min, CHEN Shuhui. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[11] | ZHAO Zhiyan, JI Xiaomo. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[12] | MA Li. Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity [J]. Netinfo Security, 2020, 20(3): 1-8. |
[13] | SONG Yubo, FAN Ming, YANG Junjie, HU Aiqun. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | LI Ning, LI Bochao. Token-based UTM Architecture for Mobile Internet [J]. Netinfo Security, 2020, 20(3): 18-28. |
[15] | ZHOU Quan, YANG Ningbin, XU Shumei. Fault - tolerant and Verifiable Public Key Searchable Encryption Scheme Based on FBDH Algorithm [J]. Netinfo Security, 2020, 20(3): 29-35. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||