共 50 条
- [41] Efficient Detection of Vacuity in Temporal Model Checking Formal Methods in System Design, 2001, 18 : 141 - 163
- [42] Intrusion detection system evaluation model based on model checking PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 723 - 727
- [43] A Survey on Metamorphic Malware Detection based on Hidden Markov Model 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 357 - 362
- [44] Malware Detection Using RGB Images and CNN Model Subclassing ADVANCES IN CYBERSECURITY, CYBERCRIMES, AND SMART EMERGING TECHNOLOGIES, 2023, 4 : 3 - 13
- [45] Detection of Adversarial PE File Malware via Model Interpretation Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1926 - 1943
- [46] Enhancing PDF Malware Detection through Logistic Model Trees CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 3645 - 3663
- [47] Policy conflict detection method based on model checking Wu, D., 1600, Univ. of Electronic Science and Technology of China (42): : 745 - 748+768
- [49] Vulnerable Smart Contract Detection by means of Model Checking BSCI'22: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE, 2022, : 3 - 10