1CHEN Ping, LIEVEN D, CHtLISTOPHE H. A Study on Advance Persistent Threats[C]//IFIP. Communications and Multimedia Security, September 25-26, 2014.Aveiro, Portugal. Berlin Heidelberg: Springer, 2014: 63-72. 被引量:1
2LANGNEtk tk. Stuxnet: Dissecting a Cyberwarfare Weapon[C]// IEEE Computer Society. Security & Privacy, IEEE, May 23-24, 2011. Claremont Resort in Oakland, California. New York: IEEE, 2011, 9(3): 49-51. 被引量:1
3NSFOCUS Information Technology Co Ltd. 2014 ICS Security Report[EB/OL]. http://vdisk,weibo.com/s/rlDAFAovsYVH, 2014-3- 11,. 被引量:1
4NIST. Managing Information Security kisk: Organization, Mission, and Information System View[EB/OL].http://csrc.nist.gov/publications/nistbul/itlbu12012_10.pdf, 2011-3-1. 被引量:1
6DIWAN S A, PERUMAL S, FATAH AJ. Complete Security Package for USB Thumb Drive[J].Computer Engineering and Intelligent Systems, 2014, 5(8):30-37. 被引量:1
8LI Shaobo, JIA Xiaohui, LV Shulin, et al. Research and Application of USB Filter Driver Based on Windows Kernel[C]//IEEE Computer Society. Third International Symposium on Intelligent Information Technology and Security Informatics, April 2-4 2010. Jinggangshan, China. New York: IEEE, 2010:438-441. 被引量:1
9ALZAROUNI M. The Reality of Risks from Consented Use of USB Devices[C]//Edith Cowan University. Proceedings of 4th Australian Information Security Management Conference, December 5, 2006. Edith Cowan University, Perth, Western Australia. Perth: School of Computer and Information Science, Edith Cowan University, 2006: 312-317. 被引量:1
10NOHL K, KRIBLER S, LEHL J. BadUSB-on Accessories That Turn Evil[EB/OL].https://srlabs.de/blog/wp-content/uploads/2014/07/ SR.Labs-BadUSB-BlackHat-vl.pdf (2014), 2014-8-6. 被引量:1