Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2006-01
Add to Favorite Get Latest Update

Research of Detection of Trojan Horse

LIU Qiang,DENG Yaping,XU Zhen,DONG Shirong,YIN Ke(Institute of Computer Science and Technology,CQUPT,Chongqing 400065)  
This paper analyses the technology of Trojan horse detection and presents a new method to detect Trojan horse based DLL retransmission in the Windows system.
【Fund】: 重庆市教委科学技术研究资助项目(050302)
【CateGory Index】: TP309.5
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 ZHANG Rui-xia(Institute of Computer and Control,Guilin University of Electronic Technology,Guilin,541004);A Practical Strategy for Anti-Trojan Detection[J];Computer Security;2009-09
2 LUO Gai-long1,CHENG Sheng-li2(1.Computer Department,Jiangxi Bluesky University,Nanchang 330098;2.Computer Department,Wuhan University of Technology,Wuhan 430000);Research on Trojan Horse Based on Port Reuse Technology[J];Computer Engineering;2007-15
China Proceedings of conference Full-text Database 1 Hits
1 WANG Ding,ZHANG Xiao-song,LONG Xiao-shu (School of Computer Science & Engineering,University of Electronic Science and Technology of China,Chengdou Sichuan 611731,China);Rootkit Detection Technique Based on NTFS Disk Parse[A];[C];2009
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ZHUO Li-Xia,TIAN Jia(School of Business Administration,Chongqing Institute of Technology,Chongqing 400050,China);On C4.5-Based Integration Method[J];Journal of Chongqing Institute of Technology;2006-11
2 YU JiJ-jiang The computer and information engineering department , heze university,heze 274000,shandong,china;The Trojan horse concealment programmer based on DLL technology[J];Computer Knowledge and Technology;2005-21
3 WANG Yi-ping,YU Li,YAN Fu,ZUO Yan-jie (School of Computer and Control Engineering,Qiqihar University,Qiqihar 161000,China);Study of C4.5 algorithm based intrusion detection system[J];Journal of Science of Teachers' College and University;2007-03
4 LIU Hongyan (Center of Modern Education Technology,Gansu Association University, Lanzhou Gansu 730000,China);A Discusstion on the Model of the Distance Education Under the Internet[J];Journal of Gansu Education College(Natural Science Edition);2003-03
5 PENG Ying-chun~1,TAN Han-song~2(1.Shenzhen Institute of Information Technology,Shenzhen 518029,China;2.College of Information Science and Engineering,Central South University,Changsha 410083,China);Research on the concealing technology of Trojan horse based on DLL[J];Information Technology;2005-12
6 Zhang Jianxin(Shanghai Jiaotong University,Shanghai200030);Analyzing the Kernel Architecture of the Windows2000Operating System and Programming It's Drivers[J];Computer Engineering and Applications;2002-10
7 Zhu Ming Xu Qian Liu Chunming(Automation Department ,The University of Science and Technology of China,Hefei230027);Analysis of Trojan Horse and Its Detection[J];Computer Engineering and Applications;2003-28
8 Kang Zhiping Xiang Hong(College of Software Engineering,Chongqing University,Chongqing 400030);Research and Practice on the Concealing Technology of Trojan Horses[J];Computer Engineering and Applications;2006-09
9 PAN Mian1,XUE Zhi1,LI Jianhua1,LI Shenghong2 (1.School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200030; 2.Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030);New Scheme for the Injection of Trojan Horse Based on DLL[J];Computer Engineering;2004-18
10 LI Xueying1,2,LIU Baoxu2,XU Rongsheng2 (1.Network Information Center, Institute of Medical Information, Academy of Military Medical Sciences ,Beijing 100850; 2.Computing Center, Institute of High Energy Physics, CAS, Beijing 100039);Research of String Matching Techniques[J];Computer Engineering;2004-22
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved