共 56 条
- [1] Abdessadki I., 2019, International Journal of Computer Network and Information Security(IJCNIS), V11, P1, DOI DOI 10.5815/IJCNIS.2019.06.01
- [2] Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 183 - 194
- [3] Adversarial Deep Learning for Robust Detection of Binary Encoded Malware [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 76 - 82
- [4] Athiwaratkun B, 2017, INT CONF ACOUST SPEE, P2482, DOI 10.1109/ICASSP.2017.7952603
- [5] Bekerman D, 2015, IEEE CONF COMM NETW, P134, DOI 10.1109/CNS.2015.7346821
- [6] Bhargava N., 2013, INT J ADV RES COMPUT, V3, P1114
- [7] A fuzzy random forest [J]. INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2010, 51 (07) : 729 - 747