6Rabek J C, Khazan R 5, Lewandowski S M, et al. Detection of Injected, Dynamically Generated and Obfuscated Malicious Code[C]//Proc. of the 2003 ACM Workshop on Rapid Malcode. New York, USA: ACM Press, 2003: 76-82. 被引量:1
7Cohen F. Computer Virus Theory and Experiments[J]. Computer & Security, 1987, 6(1): 22-35. 被引量:1
8BHATTACHERJEE A. Understanding information systems continu-ance :an expectation - confirmation model [ J ] ? MIS Quarterly,2001’ 25 (3) : 351 -370. 被引量:1
9ZEITHAML V A. Consumer perceptions of price, quality and value : ameans — end model and synthesis of evidence [ J]. Journal of Market-ing, 1988,52 (7); 2-22. 被引量:1
10CHEN C - F. Investigating structural relationships between servicequality,perceived value,satisfaction,and behavioral intentions forair passengers: evidence from Taiwan [ J]. Journal of TransportationResearch Part A, 2008, 42 (4) : 709 - 717. 被引量:1