共 50 条
- [41] Detection of Spyware by Mining Executable Files FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 295 - 302
- [42] Tamper detection marking for object files MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 747 - 751
- [43] Detection of the Music or Video Files in BitTorrent THEORY AND PRACTICE OF COMPUTATION, 2012, 5 : 202 - 213
- [44] Honeyfiles: Deceptive files for intrusion detection PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 116 - 122
- [47] A technique for intrusion detection using multiple sequence alignment of system tall sequences 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: II, 2003, : 168 - 172
- [49] Improving Transmission Efficiency of Large Sequence Alignment/Map (SAM) Files PLOS ONE, 2011, 6 (12):