共 162 条
[32]
Cook D.J. Holder., 2006, MINING GRAPH DATA
[33]
Dai SF, 2013, IEEE INFOCOM SER, P809
[34]
Evading Classifiers by Morphing in the Dark
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:119-133
[35]
Davidsen SA, 2015, 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1366, DOI 10.1109/ICACCI.2015.7275803
[38]
Department of Computer Science Federal University Wukari Wukari Nigeria., 2018, International Journal of Advanced Research in Computer Science, V9, P504, DOI [10.26483/ijarcs.v9i1.5429, 10.26483/ijarcs.v9i1.5429, DOI 10.26483/IJARCS.V9I1.5429]
[39]
Department of Computer Science Virtual University of Pakistan, 2018, International Journal of Education and Management Engineering, V8, P20, DOI [10.5815/ijeme.2018.02.03, DOI 10.5815/IJEME.2018.02.03]
[40]
Desnos A., 2011, ANDROGUARD