共 67 条
[51]
Rieck K, 2010, J MACH LEARN RES, V11, P555
[52]
PolyUnpack: Automating the hidden-code extraction of unpack-executing malware
[J].
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2006,
:289-+
[53]
VECTOR-SPACE MODEL FOR AUTOMATIC INDEXING
[J].
COMMUNICATIONS OF THE ACM,
1975, 18 (11)
:613-620
[54]
SCHULTZ MG, 2001, P IEEE S SEC PRIV OA
[55]
Sharif M., 2009, P IEEE S SEC PRIV OA
[56]
Shawe-Taylor J., 2004, KERNEL METHODS PATTE, DOI DOI 10.1017/CBO9780511809682
[57]
SONG D, 2008, P 4 INT C INF SYST S
[58]
Stolfo SJ, 2007, ADV INFORM SECUR, P231
[59]
Symantec, 2008, INT SEC THREAT REP, VXIV
[60]
Szor Peter, 2005, ART COMPUTER VIRUS R