共 53 条
[1]
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:183-194
[2]
Ahmadi M, 2013, COMPUT FRAUD SECUR, P11, DOI 10.1016/S1361-3723(13)70072-1
[3]
Akbal Erhan, 2016, Journal of Software, V11, P631, DOI 10.17706/jsw.11.7.631-637
[4]
Capital Structure and Financial Performance: A Case of Saudi Petrochemical Industry
[J].
JOURNAL OF ASIAN FINANCE ECONOMICS AND BUSINESS,
2020, 7 (07)
:105-112
[5]
[Anonymous], 2006, Wireshark Ethereal network protocol analyzer toolkit
[6]
[Anonymous], 2011, Windows Sysinternals Administrator's Reference
[8]
Buchholz Florian., 2005, DFRWS, P1
[9]
Butler J., 2011, PHYS MEMORY FORENSIC