共 16 条
[1]
Ahmed F, 2009, P 2 ACM WORKSH SEC A, P55, DOI [DOI 10.1145/1654988.1655003, 10.1145/1654988.1655003]
[2]
Profile hidden Markov models and metamorphic virus detection
[J].
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2009, 5 (02)
:151-169
[4]
Comar PM, 2013, IEEE INFOCOM SER, P2022
[6]
Guanghui Liang, 2016, International Journal of Information and Education Technology, V6, P291, DOI 10.7763/IJIET.2016.V6.702
[7]
Khodamoradi Peyman., 2015, 2015 18th CSI International Symposium on Computer Architecture and Digital Systems (CADS), P1, DOI DOI 10.1109/CADS.2015.7377792
[8]
Support Vector Machine for malware analysis and classification
[J].
2014 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 2,
2014,
:415-420
[9]
Quinlan J.R., 1993, 10 INT C MACH LEARN
[10]
Rieck K, 2008, J MACH LEARN RES, V9, P23