共 36 条
[1]
Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
[2]
Dahl GE, 2013, INT CONF ACOUST SPEE, P3422, DOI 10.1109/ICASSP.2013.6638293
[6]
Malware Detection Using Perceptrons and Support Vector Machines
[J].
2009 COMPUTATION WORLD: FUTURE COMPUTING, SERVICE COMPUTATION, COGNITIVE, ADAPTIVE, CONTENT, PATTERNS,
2009,
:283-288
[7]
Gove R., 2014, Proc. VizSec, P72, DOI DOI 10.1145/2671491.2671496
[8]
Han B, 2014, SCI WORLD J, DOI [10.1155/2014/724804, 10.1155/2014/132713]
[9]
Islam R., 2010, Proceedings Second Cybercrime and Trustworthy Computing Workshop (CTC 2010), P9, DOI 10.1109/CTC.2010.11
[10]
Kolter JZ, 2006, J MACH LEARN RES, V7, P2721