共 122 条
[1]
Abomhara M., 2015, Journal of Cyber Security and Mobility, P65, DOI DOI 10.13052/JCSM2245-1439.414
[2]
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:183-194
[4]
Detecting A Crypto-mining Malware By Deep Learning Analysis
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2022, 22 (06)
:172-180
[6]
Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
[7]
[Anonymous], 2011, PROC 8 INT S VISUAL, DOI DOI 10.1145/2016904.2016908
[8]
[Anonymous], 2023, HEIGHTENED DDOS THRE
[9]
[Anonymous], 2018, Secur Commun Netw
[10]
[Anonymous], 2023, LOOK EXAMPLES IOT DE