共 54 条
[1]
Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
[J].
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019),
2019,
:1296-1305
[2]
Alasmary Hisham, 2018, Computational Data and Social Networks. 7th International Conference, CSoNet 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11280), P259, DOI 10.1007/978-3-030-04648-4_22
[3]
Alasmary H, 2020, 40 IEEE INT C DISTRI, P1296
[5]
SoK: Security Evaluation of Home-Based IoT Deployments
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:1362-1380
[6]
[Anonymous], Upx: The ultimate packer for executables
[7]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]
Anwar Afsah, 2020, Information and Communications Security. 22nd International Conference, ICICS 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12282), P443, DOI 10.1007/978-3-030-61078-4_25
[10]
Bendiab G, 2020, PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, P444, DOI 10.1109/NetSoft48620.2020.9165381