共 53 条
- [1] Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 183 - 194
- [2] Ahmadi M, 2013, COMPUT FRAUD SECUR, P11, DOI 10.1016/S1361-3723(13)70072-1
- [3] Akbal Erhan, 2016, Journal of Software, V11, P631, DOI 10.17706/jsw.11.7.631-637
- [4] Capital Structure and Financial Performance: A Case of Saudi Petrochemical Industry [J]. JOURNAL OF ASIAN FINANCE ECONOMICS AND BUSINESS, 2020, 7 (07): : 105 - 112
- [5] [Anonymous], 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST), DOI [DOI 10.1109/THS.2016.7568881, 10.1109/ths.2016.7568881]
- [6] [Anonymous], 2012, C NETW CYBER SECUR
- [7] [Anonymous], 2011, WINDOWS SYSINTERNALS
- [8] [Anonymous], 2008, LINUX J
- [10] Buchholz FlorianP., 2005, DFRWS