共 26 条
[3]
Bagheri Hamid, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P514, DOI 10.1109/DSN.2016.53
[4]
Bai S, ARXIV
[5]
Darus FM, 2018, PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC)
[6]
Ding YX, 2018, INT CONF MACH LEARN, P331, DOI 10.1109/ICMLC.2018.8526935
[8]
CNN-based Android Malware Detection
[J].
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA),
2017,
:60-65
[9]
Hsien-De Huang T, 2018, IEEE INT CONF BIG DA, P2633, DOI 10.1109/BigData.2018.8622324
[10]
ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files
[J].
SYMMETRY-BASEL,
2020, 12 (10)
:1-18