1. Zhang Ai-hua, Zhao Lian-qiang, Shu Hua-ying. The evolution of investments decision mode in China’s telecommunication. The Journal of China Universities of Posts and Telecommunications, 2007 14 (1): 122-128
2. Bluetooth Special Interest Group. Bluetooth Core Specification Version 2.0+ EDR. http://www.bluetooth.org, 2004-11
3. Andersson S. MMS Security Considerations. 3GPP TSG SA WG3 Security, 2003
4. Mulliner C. Security of smart phones, master’s thesis, department of computer science. Santa Barbara, CA, USA: University of California Santa Barbara, 2006
5. Tang C. Summary of mobile threats for year 2005. [2006-04-06]. http://www.it-observer.com/pdf/dl/mobile_threat_sum.pdf
6. Lactaotao M. Security information: virus encyclopedia: symbos comwar. a: technical details. Trend Micro Incorporated, 2005
7. SU J, Chan K K W, Miklas A G, et al. A preliminary investigation of worm infections in a bluetooth environment. Proceedings of the 4th ACM Workshop on Recurring Malcode (WORM’06) Co-located with the 13th ACM Conference on Computer and Communications Security (CCS’06), Nor 3, 2006, Alexandria, VA, USA. New York, NY, USA: ACM, 2006: 9-16
8. Zheng Hui, Li Dong, Gao Zhuo. An epidemic model of mobile phone virus. The 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA’06), Aug 3-5, 2006, Urumchi, China. Piscataway, NJ, USA: IEEE Computer Society, 2006: 534-538
10. Mulliner C, Vigna G. Vulnerability analysisof MMS user agents. Proceedings of 22nd Annual Computer Security Applications Conference (ACSAC’06), Dec 11-15, 2006, Miami Beach, FL, USA. Los Alamitos, CA, USA: IEEE Computer Society, 2006: 77-88
11. Carettoni L, Merloni C, Zanero S. Studying Bluetooth malware propagation: the BlueBag project. IEEE Security and Privacy, 2007, 5(2): 17-25
12. Daley D J, Gani J. Epidemic modelling: an introduction. Cambridge, UK: Cambridge University Press, 1999
13. Zou C C, Towsley D, Gong W. Email worm modeling and defense. Proceedings of 13th International Conference on Computer Communications and Networks (ICCCN'04), Oct 11-13, 2004, Chicago, IL, USA. Piscataway, NJ, USA: IEEE Computer Society, 2004: 409-414
14. Zou C C C, Towsley D. Email virus propagation modeling and analysis. Umass ECE Technical Report TR-03-CSE-04. 2003
15. Yuan Hua, Chen Guo-qing. Simulation model of e-mail virus propagation and simulation of its influence factors. Computer Engineering and Design, 2006, 27(11): 1914-1916 (in Chinese) |