Application audit technology based on the combination of cloud and terminal
The flourish and popularity of Android terminals have greatly changed the peoples’ daily life and also brought new conditions to the internet Dark Industry Chain.The features of advanced malicious programs on intelligent terminals,and the reasons why an audit method of network activities was needed...
Saved in:
Main Authors: | Yongjun HUANG, Dongxin LIU, Huamin JIN, Guorong LIU, Laifu WANG, Jun SHEN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2018-02-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018097/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Data encryption technology based on cloud and terminal collaboration
by: Guorong LIU, et al.
Published: (2018-02-01) -
Virtualization and isolation technology in intelligent terminals
by: Yongjun HUANG, et al.
Published: (2018-02-01) -
A digital signature scheme based on shared key in intelligent terminal
by: Guorong LIU, et al.
Published: (2017-02-01) -
Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal
by: Jun Li
Published: (2013-08-01) -
Key technology of VANET in terminal-management-cloud model
by: Junhui ZHAO, et al.
Published: (2016-08-01)