共 65 条
- [21] ietf, Secure Sockets Layer Version 3.0
- [22] ietf, Transportation Layer Security Version 1.3
- [24] Jhi YC, 2011, 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), P756, DOI 10.1145/1985793.1985899
- [25] Pixy: A static analysis tool for detecting Web application vulnerabilities - (Short paper) [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 258 - +
- [26] Malware classification based on call graph clustering [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 233 - 245
- [27] Lannan Luo, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P550, DOI 10.1109/DSN.2016.56
- [29] LibD: Scalable and Precise Third-party Library Detection in Android Markets [J]. 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2017, : 335 - 346
- [30] Software Vulnerability Discovery Techniques: A Survey [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 152 - 156