计算机病毒论文方面的文献
[1] 冯登国. 计算机通信网络安全. 北京:清华大学出版社, 2001 [2] dorothy denning, ”cryptography and data security”, add**on-wesley. **bn 0-201-10150-5. [3] m. b**hop and d. bailey, “a critical analys** of vulnerability taxonomies”, technical report cse-96-11, dept. of computer science, university of california at d****, d****, ca 95616-8562 (sep. 1996). [4] 微软安全中心. [5] frsirt. [6] 国际cve标准. [7] mitre corporation. common vulnerabilities and exposures. **ailable from , accessed 2003. [8] wenliang du,aditya p. mathur. vulnerability testing of software system using fault injection.coast tr 98-02, 1998. [9] cvss. [10] matt blaze. 2002 september 15 (preprint, rev**ed 2003 march 02). cryptology and physical security: rights amplification in master-keyed mechanical locks. ieee security and privacy (march/april 2003). [11] steven m. chr**tey and chr** wysopal. 2002 february 12 (expired 2002 august 12). responsible vulnerability d**closure process (internet-draft rfc). [12] computer emergency response team/coordination center. 2000 october 09. cert/cc vulnerability d**closure policy. [13] computer emergency response team/coordination center. 2003. cert/cc vulnerability metric. [14] russ cooper. 2001. proposal – the responsible d**closure forum. [15] denn** f**her. 2003 november 18. “security researcher calls for vulnerability trade association.” eweek. [16] daniel e. geer, jr. (editor), denn** devlin, jim duncan, jeffrey schiller, and jane winn. 2002 third quarter. “vulnerability d**closure.” secure business quarterly. [17] daniel e. geer, jr. (editor), mary ann d**idson, marc donner, lynda mcghie, and adam shostack. 2003 second quarter. “patch management.” secure business quarterly. [18] tiina h**ana. 2003 april. communication in the software vulnerability reporting process. m.a. thes**, university of jyvaskyla. [19] internet security systems. 2002 november 18 (rev**ed). x-force™ vulnerability d**closure guidelines. [20] elias levy. 2001 october 21. “security in an open electronic society.” securityfocus. [21] microsoft corporation. 2002 november (rev**ed). microsoft security response center security bulletin severity rating system. [22] marcus ranum. 2000 october. “the network police blotter – full d**closure ** bogus.” ;login:the magazine of usenix & sage. volume 25, no. 6: 47-49. [23] krsul v.software vulnerability analys**.department of computer sciences, purdue university, 1998 [24] @stake. 2002 june 05. security vulnerability reporting policy. **ailable from , accessed 2003. [25] william a. arbaugh, william l. fithen, and john mchugh. 2000 december. windows of vulnerability: a case study analys**. ieee computer. [26] ross anderson. 2001. security engineering: a guide to building dependable d**tributed systems. john wiley & sons. **bn: 0-471-38922-6. [27] matt b**hop. 2003. computer security: art and science. add**on-wesley professional. **bn: 0-201-44099-7. [28] matt b**hop. 1999 september. vulnerabilities analys**. proceedings of the second international symposium on recent advances in intrusion detection. [29] 单国栋, 戴英侠, 王航. 计算机漏洞分类研究. 计算机工程,2002,28(10):3-6 [30] 夏云庆 编著 v**ual c++ 6.0 数据库高级编程 北京希望电子出版社 [31] 段钢 编著 加密与解密(第二版) 电子工业出版社 [33] 候俊杰 著 深入浅出mfc 第2 版 华中科技大学出版社 [34] applied microsoft.net framework programming (美) jeffrey richter 著 清华 大学出版社 [35] national vulnerability database [36] us-cert vulnerability notes. [37] securityfocus. [38] internet security systems – x-force database. [39] the open source vulnerability database 20210311