[1]Gold S. Will holey handsets get caught "app napping"? [J]. Engineering&Technology,2011,6(8):78-81
[2]Shabtai A, Fiedel Y, Kanonov U, et al. Google android:a com-prehensive security assessment[J].IEEE Security & Privacy, 2010,8(2):35-44
[3]唐杰,逯全芳,文红.基于AHP移动终端系统的安全风险评估[J].信息安全与技术,2013,4(3):13-16
[4]Chen Zhihong, Lu Guoming, He Xuezhi, et al. A method of security evaluation based on fuzzy mathematics[C]//Proc of Apperceiving Computingand Intelligence Analysis. Piscataway , NJ: IEEE, 2008: 106-109
[5]陈锡庚. 一种量化的移动智能终端风险评估方法[J]. 数字通信,2013,40(6):119-126
[6]李佳,郑康峰,崔旭.一种基于模糊层次分析的智能手机攻击效果评估方法[C/OL]//中国智慧城市论坛论文集. 2011[2017-10-20].http://www.docin.com/p-348524010.html
[7]李杨,韦伟,刘永忠.一种基于AHP的信息安全威胁评估模型研究[J].计算机科学, 2012, 39(1): 61-137
[8] Theoharidou M,Mylonas A, Gritzalis D.A risk assessment method for smartphones[C]//Proc of the 27th IFIP Information Security and Privacy Conf.Berlin:Springer ,2012:443-456
[9] Tsaih Y,Huang Yulun.An analytic hierarchy process-based risk assessment method for wireless networks[J].IEEE Trans on Reliability,2011,60(4):801-816
[10] 李雄伟,王明,杨义先,等.Fuzzy-AHP法在网络攻击效果评估中的应用[J].北京邮电大学学报,2006,29(1):124-127