共 10 条
[1]
Alazab M., 2011, P AUSDM, V121, P171, DOI DOI 10.5555/2483628.2483648
[2]
[Anonymous], ARXIV14102131
[3]
Chowdhury Mozammel., 2017, International Conference on Applications and Techniques in Cyber Security and Intelligence, P266
[4]
Chumachenko K., 2017, Machine Learning Methods for Malware Detection and Classification
[6]
Jain A., 2017, 2017 2 INT C TELECOM, P1
[7]
Kolbitsch Clemens, 2009, USENIX Security, P351, DOI DOI 10.1093/MP/SSQ045
[8]
Kolosnjaji Bojan, 2016, AI 2016: Advances in Artificial Intelligence. 29th Australasian Joint Conference. Proceedings: LNAI 9992, P137, DOI 10.1007/978-3-319-50127-7_11
[9]
Santos I, 2013, ADV INTELL SYST COMP, V189, P271
[10]
Tzu-Yen Wang, 2009, Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC, P278, DOI 10.1109/NCM.2009.385