共 36 条
[1]
360 Internet Security Center, NRSMiner: A sophisticated mining botnet
[3]
Energy Efficient Resource Allocation in D2D-Assisted Heterogeneous Networks with Relays
[J].
IEEE ACCESS,
2016, 4
:4902-4911
[4]
Hidden Markov models for malware classification
[J].
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2015, 11 (02)
:59-73
[5]
[Anonymous], 2012, Secur. Inform, DOI DOI 10.1186/2190-8532-1-1
[6]
Survey on the Internet of Vehicles: Network Architectures and Applications
[J].
IEEE Communications Standards Magazine,
2020, 4 (01)
:34-41
[8]
Devesa J, 2010, ICEIS 2010: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 2: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, P395
[9]
Du X., 2004, Ad Hoc Networks, V2, P241
[10]
Duan YH, 2015, IEEE ICC, P5691, DOI 10.1109/ICC.2015.7249229