共 291 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[3]
Ade R. R., 2013, Int. J. Data Mining Knowl. Manage. Process, V3, P119, DOI DOI 10.5121/IJDKP.2013.3408
[5]
Ahvanooey MT, 2017, INT J ADV COMPUT SC, V8, P30, DOI 10.14569/IJACSA.2017.081005
[6]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[8]
A Novel Approach to Detect Android Malware
[J].
INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA),
2015, 45
:407-417
[9]
Almuallim H., 1991, AAAI-91. Proceedings Ninth National Conference on Artificial Intelligence, P547
[10]
Alpaydin E., 2020, INTRO MACHINE LEARNI