共 16 条
[1]
Abuzaid A., 2013, IJCSI INT J COMPUTER, V10
[2]
Biedermann S, 2012, LECT NOTES COMPUT SC, V7039, P43
[3]
Dai JY, 2009, J COMPUT, V4, P405
[4]
Hatem S.S., 2014, MALWARE DETECTION CL, V5
[5]
Determining malicious executable distinguishing attributes and low-complexity detection
[J].
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2011, 7 (02)
:95-105
[6]
Unknown malcode detection and the imbalance problem
[J].
Journal in Computer Virology,
2009, 5 (04)
:295-308
[7]
Naone E., 2007, COMPUTER CLOUD
[8]
Offensive Computing, 2014, MALW SEARCH
[9]
Qaisar S., 2012, Interdisciplinary Journal of Contemporary Research in Busines (IJCRB), V3, P1323
[10]
Reimer J., 2007, DREAMING CLOUD XIOS