共 56 条
[12]
Biondi F, 2018, LECT NOTES COMPUT SC, V11244, P565, DOI 10.1007/978-3-030-03418-4_34
[13]
Bishop C. M., 2006, Pattern Recognition and Machine Learning
[15]
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:395-411
[16]
PE File Header Analysis-based Packed PE File Detection Technique (PHAD)
[J].
CSA 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND ITS APPLICATIONS, PROCEEDINGS,
2008,
:28-+
[17]
ClamAV, 2019, About us
[18]
Experimental Toolkit for Manipulating Executable Packing
[J].
RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023,
2023, 14529
:263-279
[20]
Devi Dhruwajita., 2012, Int. J. Comput. Theory Eng, V4, P476, DOI [10.7763/IJCTE.2012.V4.512, DOI 10.7763/IJCTE.2012.V4.512]