H.J. Highland, Electromagnetic radiation revisited.[J]. Computers Security.1986,5(1):85-[2]M.J. Riezenman, The rebirth of radio, IEEE Spectrum, 2001, (1), 62-64.[3]M.G. Kuhn, R. J. Anderson, Soft Tempest: hidden data transmission using electromagnetic emanations, Second Workshop on Information Hiding, Portland, Oregon, 1998, (4), 124-142.[4]韩放著,计算机信息电磁泄漏与防护,北京,科学出版社,1993.12,第一章.[5]P. Smulders, The threat of information theft by reception of electromagnetic radiation from RS232 cables.[J]. Computers Security.1990,9(1):53-[6]W. van Eck, Electromagnetic radiation from video display units.[J].an eavesdropping risk?, Computer Security.1985,4(3):269-286[7]林理忠,宋敏编著,微弱信号检测学导论,北京,中国计量出版社,1996.3,第四章.
|