共 29 条
- [2] Al-Muntaser B., 2023, Int. J. Adv. Comput. Sci. Appl, V14, DOI [10.14569/IJACSA.2023.0140636, DOI 10.14569/IJACSA.2023.0140636]
- [3] Almajali Anas, 2022, 2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA), P328, DOI 10.1109/ICECTA57148.2022.9990424
- [4] Anghel M., 2019, Cryptol. Eprint Arch
- [5] Arora P., 2023, P 5 INT C INF MAN MA, DOI [10.1145/3647444.3652439, DOI 10.1145/3647444.3652439]
- [7] Investigation of Possibilities to Detect Malware Using Existing Tools [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1277 - 1284
- [8] Bazrafshan Z, 2013, 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), P113, DOI 10.1109/IKT.2013.6620049
- [9] A survey of malware detection using deep learning [J]. MACHINE LEARNING WITH APPLICATIONS, 2024, 16