共 52 条
[32]
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:1137-1152
[33]
MITRE ATT&CK, ABOUT US
[34]
Newsome J., 2005, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
[35]
SoK: ATT&CK Techniques and Trends in Windows Malware
[J].
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I,
2019, 304
:406-425
[36]
Le Q, 2014, PR MACH LEARN RES, V32, P1188
[37]
Reed R., 1999, II, Neural Smithing: Supervised Learning in Feedforward Artificial Neural Networks
[38]
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
[J].
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018,
2018, 11050
:490-510