共 22 条
[1]
Adebiyi A., 2012, 2012 UKSim 14th International Conference on Computer Modelling and Simulation (UKSim), P19, DOI 10.1109/UKSim.2012.14
[2]
[Anonymous], INT J FAMILY MED
[3]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[4]
The Effectiveness of Source Code Obfuscation: an Experimental Assessment
[J].
ICPC: 2009 IEEE 17TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION,
2009,
:178-+
[6]
Collberg C., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P184, DOI 10.1145/268946.268962
[7]
Collberg Christian, 1997, Technical report
[9]
Application of BP Neural Network in Wireless Network Security Evaluation
[J].
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1,
2010,
:592-596