共 41 条
[1]
[Anonymous], 2018, KEY TRENDS IOT DEV S
[2]
Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
[3]
Boivin A., 2018, DEFENSE REAL THREAT
[4]
Brunton Finn, 2011, First Monday, V16, DOI 10.5210/fm.v16i5.3493
[5]
Costin A, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P95
[6]
Understanding Linux Malware
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:161-175
[8]
[Ермаков М.К. Ermakov M.K.], 2015, [Труды Института системного программирования РАН, Trudy Instituta sistemnogo programmirovaniya RAN], V27, P5, DOI 10.15514/ISPRAS-2015-27(1)-1
[9]
Gaudesi Macro., 2015, P COMPANION PUBLICAT, P757, DOI DOI 10.1145/2739482.2764940
[10]
전덕조, 2019, [Journal of Korean Institute of Information Technology, 한국정보기술학회논문지], V17, P111, DOI 10.14801/jkiit.2019.17.7.111