共 29 条
- [11] Curtsinger C., 2011, P 20 USENIX C SEC SE
- [12] Deremer F. L, 1969, Practical translators for LR(k) languages
- [13] Analysis and Identification of Malicious Java']JavaScript Code [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 1 - 11
- [14] Garera S, 2007, WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, P1
- [15] Guarnieri S., 2009, P 18 C USENIX SEC S, V10
- [16] Gundy M.V., 2009, Proceedings of the Network and Distributed System Security Symposium (NDSS), P1
- [17] Hybrids of support vector machine wrapper and filter based framework for malware detection [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 376 - 390
- [19] Kan M.-Y., 2005, P 14 ACM INT C INF K, P325, DOI DOI 10.1145/1099554.1099649
- [20] Kohavi R, 1998, The Springer International Series in Engineering and Computer Science, P33, DOI [10.1007/978-1-4615-5725-8_3., DOI 10.1007/978-1-4615-5725-8]