期刊文献+

基于用户意愿的智能手机安全监控方法研究 被引量:1

Research on Smart-phone Security Monitoring Based on User Willingness
在线阅读 下载PDF
导出
摘要 针对智能手机因中木马而产生话费给用户带来损失、杀毒软件无法查杀新木马、防火墙等手段不能很好解决木马问题的现状,对木马行为和正常业务行为进行了分析,提出一种基于业务行为特征的安全监控策略,通过对业务模块的认证达到安全监控的目的,有效阻止木马程序的破坏行为。 Customers often pay additional fees because Trojan horses load in the smart-phone. Anti-virus software can not kill these new Trojan horses. Firewall and other protected means can't solve this problem very well. In order to solve the above problems, the difference between normal business and virs are analyzed, a security policy which based on user willingness is presented, by certifying the business module to achieve operational security. It is proved by the experiment that this new policy can prevent Trojan horses effectively.
作者 张丽娜 何远
出处 《电视技术》 北大核心 2012年第18期44-46,99,共4页 Video Engineering
关键词 智能手机 用户意愿 行为特征 安全监控 smart-phone user willingness business behavior security monitoring
  • 相关文献

参考文献9

二级参考文献27

共引文献106

同被引文献8

  • 1NARENDIRAN C,RABARA S A,RAJENDRAN N. Performance evalua- tion on end- to-end security architecture for mobile banking system [C]//Proc. WD 08. 1st IFIP. [S.I. ] :IEEE Press,2008:l-4.
  • 2HARB H, FARAHAT H, EZZ M. SecureSMSPay: secure SMS mobile payment model[ C]//Proc. 2nd International conference on Anti-coun- terfeiting, Security and Identification. [ S. 1. ] : IEEE Press, 2008: 11-17.
  • 3NAREND1RAN C, RABARA S, RAJENDRAN N. Public key infrastruc- ture for mobile banking security [ C ]//Proc. 2009 Global Mobile Con- gress. IS. 1. ] :IEEE Press,2009:l-6.
  • 4FANG, ZHAN. Online banking authentication using mobile phones[ C ]//Proc. 5th International Conference on Future Information Technol- ogy. IS. 1. ] :IEEE Press,2010:l-5.
  • 5YIN Xue, ZOU Junwei. An improved dynamic identity authentication scheme based on PKI - SIM card [ C ]//Proc. International Conference on Wireless Communications, Networking and Mobile Computing. [S. 1. ] :IEEE Press,2009:l--4.
  • 6马志.手机银行遭遇安全瓶颈 PKI-SIM或成突围利器[J].通信世界,2008(25). 被引量:2
  • 7王四军,茹昭.一种使移动终端无缝接入传统网银系统的方案[J].计算机应用与软件,2011,28(12):102-104. 被引量:5
  • 8刘人杰.手机短信安全与应用研究[J].硅谷,2012,5(6):91-92. 被引量:6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部