共 25 条
[1]
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[2]
[Anonymous], 2011, P 8 INT S VIS CYB SE
[3]
Arp D, 2014, NETW DISTR SYST SEC
[5]
Histograms of oriented gradients for human detection
[J].
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS,
2005,
:886-893
[6]
Demme J., 2013, ACM SIGARCH computer architecture news, V41, P559, DOI 10.1145/2485922
[8]
Feng Y., AUTOMATED SYNTHESIS
[9]
Idika Nwokedi., 2007, SURVEY MALWARE DETEC
[10]
Javaheri D, 2017, WIRELESS PERS COMMUN, V98, P1