[1]Szor P. The Art of Computer Virus Research and Defense[M]. Addisonwesley Professional,2006.
[2]Kumar S. A Generic Virus Scanner in C++[C]∥Proc of the 8th Computer Security Applications Conference, 1992:210219.
[3]Mare V. INC. Virtualization Overview [EB/OL]. [20091003]. http://www.vmware.com/pdf/ virtualization.pdf.
[4]Laureano M, Maziero C, Jamhour E. Protecting HostBased Intrusion Detectors Through Virtual Machines[J]. Computer Networks, 2007, 51(5):12751283.
[5]Saaty T L. How to Make a Decision, The Analytic Hierarchy Process[J] . European Journal of Operational Research, 1990, 48(1):926.
[6]Joyce M A, Saaty T L. The Forward and Backward Processes of Conflict Analysis[J]. Behavioral Science, 1997(2):8798.
[7]国务院信息化工作办公室. 电子政务信息安全等级保护实施指南(试行)[S]. 2005.
[8]袁宁,宣蕾.基于多维超混沌系统的图像加密方法研究[C]∥Proc of the Fourth AsiaPacific Workshop on Chaos Control and Synchronization (APWCCS’07), & the First Chinese Forum on Chaos Applications (CFCA’07), 2007:429438.
[9]郑永爱.混沌映射的随机性分析及应用:[硕士学位论文][D].长沙: 国防科学技术大学,2007.
[10]张健. 我国计算机病毒现状和发展趋势[Z]. 国家计算机病毒应急处理中心, 2008.