解析嵌入式系统的网络信息软件应用
摘要
随着计算机技术不断发展,嵌入式系统在网络信息中应用广泛,嵌入式技术已成为计算机技术的重要分支之一,本文就嵌入式系统在网络信息软件中的应用进行了分析讨论。
二级参考文献10
-
1Arora D,,Ravi S,Raghunathan A,et al.Secure Em-bedded Processing through Hardware-assisted Runtime Monitoring[].ProcACM/IEEE DesignAuto-mationand Test in Europe(DATE).2005
-
2Collberg C S,Thomborson C.Watermarking,Tamper-proofing,and Obfuscation-tools for Software Protection[].IEEE Tans Software Eng.2002
-
3Edward Suh G,JaeWook Lee,Srinivas Devadas.Se-cure Program Execution via Dynamic Information Flow Tracking. Technical Report,MIT LCS TR-912 . 2003
-
4Kiriansky V,Bruening D,Amarasinghe S P.Secure Ex-ecution Via Program Shepherding[].Proceedings of theth USENIX Security Symposium.2002
-
5Smith S,Weingart S.Building A High-performance Programmable Secure Coprocessor[].The International Journal of Computer and Telecommunications Networking.1999
-
6Neville-neil G V.Programming Without A net[].ACM Queue:Tomorrow s Computing Today.2003
-
7Arora D,Raghunathan A,Ravi S.Enhancing Security Through Hardware-assisted Run-time Validation of Program Data Properties[].Proc ACM/IEEE Inter-national Conference on Hardware Software Co-design and System Synthesis(CODES+ISSS).2005
-
8Ravi,S,Raghunathan,A,Kocher,P,Hattangady,S.Security in Embedded Systems:Design Challenges[].ACMTransactions on Embedded Computing Systems.2004
-
9Shuo Chen,,Zb ign iew Kalbarczyk,Jun Xu,RavishankarK Iyer.A Data-D riven F in ite State Mach ine Model for Analyzing Security Vu lnerab ili-ties[].DSN.2003
-
10HORNE B,MATHESON L,SHEEHAN C.Dynamic self-checkingtechniques for improved tamper resistance[].Proc of Security andPrivacy in Digital Rights Management.2001
-
1卓高彤.嵌入式系统的网络信息软件应用[J].数字技术与应用,2010,28(11):125-125. 被引量:1
-
2季刚.试论计算机信息软件的维护和管理[J].信息与电脑,2015,27(7):72-73.
-
3邹华.计算机信息软件维护和管理[J].通讯世界(下半月),2016(9):32-32. 被引量:1
-
4孙亮.计算机软件信息软件维护和管理探讨[J].电子制作,2015,23(9X). 被引量:2
-
5美国欲在社交网站安“潜伏”软件[J].计算机安全,2012(2):91-91.
-
6乔东.计算机控制中的网络与通信技术[J].数字技术与应用,2011,29(12):42-42. 被引量:14
-
7黑客组织曝IS已创建自营APP 监控难度恐增[J].信息安全与通信保密,2016,14(2):82-82.
-
8王培博.智能蚂蚁算法应用的最新进展[J].电脑知识与技术,2017,13(2):183-185. 被引量:1