共 30 条
[21]
Miller Brad, 2016, Detection of Intrusions and Malware, and Vulnerability Assessment. 13th International Conference, DIMVA 2016. Proceedings: LNCS 9721, P122, DOI 10.1007/978-3-319-40667-1_7
[22]
Mohaisen A., 2014, DETECTION INTRUSIONS
[24]
Perdisci R., 2010, P USENIX C NETW SYST
[25]
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables
[J].
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2008,
:301-+
[26]
Rafique MZ, 2013, LECT NOTES COMPUT SC, V8145, P144, DOI 10.1007/978-3-642-41284-4_8
[27]
Rajab M. A., 2013, NETWORK DISTRIBUTED
[29]
Yang C., 2014, EUR S RES COMP SEC
[30]
Dissecting Android Malware: Characterization and Evolution
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:95-109