共 55 条
[41]
Sathyanarayan VS, 2008, LECT NOTES COMPUT SC, V5107, P336, DOI 10.1007/978-3-540-70500-0_25
[42]
Saxe J, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P11, DOI 10.1109/MALWARE.2015.7413680
[43]
Data mining methods for detection of new malicious executables
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:38-49
[44]
Shabtai Asaf, 2009, Information Security Technical Report, V14, P16, DOI 10.1016/j.istr.2009.03.003
[46]
Thomas R., 2017, Lief - library to instrument executable formats
[47]
Tian R, 2008, MALWARE 2008: PROCEEDINGS OF THE 2008 3RD INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P79
[48]
Vaswani A, 2017, ADV NEUR IN, V30
[49]
Wojnowicz Michael, 2016, Journal of Innovation in Digital Ecosystems, V3, P130, DOI [10.1016/j.jides.2016.10.009, 10.1016/j.jides.2016.10.009]