共 131 条
[23]
DeBarr D, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P67, DOI 10.1109/ISI.2013.6578788
[24]
Devi B. Thirumaleshwari, 2020, 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA). Proceedings, P722, DOI 10.1109/ICIMIA48430.2020.9074924
[25]
Dewan P, 2014, PROCEEDINGS OF THE 2014 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), DOI 10.1109/ECRIME.2014.6963160
[26]
Malware target recognition via static heuristics
[J].
COMPUTERS & SECURITY,
2012, 31 (01)
:137-147
[27]
Mitigating Drive-By Download Attacks: Challenges and Open Problems
[J].
INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY,
2009, 309
:52-+
[29]
Esfahani Alireza, 2019, Broadband Communications, Networks, and Systems. 9th International EAI Conference, Broadnets 2018. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 263), P159, DOI 10.1007/978-3-030-05195-2_16