共 45 条
- [1] Aresu M, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P128, DOI 10.1109/MALWARE.2015.7413693
- [2] Arshad S, 2016, INT J ADV COMPUT SC, V7, P463
- [5] Flexible neural trees based early stage identification for IP traffic [J]. SOFT COMPUTING, 2017, 21 (08) : 2035 - 2046
- [6] Chung J., 2014, ARXIV
- [7] David OE, 2015, IEEE IJCNN
- [9] Android Security: A Survey of Issues, Malware Penetration, and Defenses [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02): : 998 - 1022
- [10] Felt A. P., 2011, PROC 1 ACM WORKSHOP, P3, DOI DOI 10.1145/2046614.2046618