共 52 条
- [1] Anderson B., 2012, P 5 ACM WORKSHOP SEC, P3, DOI DOI 10.1145/2381896.2381900
- [2] Graph-based malware detection using dynamic analysis [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 247 - 258
- [3] Baecher P, 2006, LECT NOTES COMPUT SC, V4219, P165
- [4] Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
- [5] Bayer U., 2006, TTANALYZE TOOL ANAL
- [6] Bayer U, 2009, P NDSS, V9, P8
- [7] Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
- [8] Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
- [10] Buehlmann S, 2010, JOEBOX SECURE SANDBO