共 60 条
[2]
Andresini G, 2020, STUD COMPUT INTELL, V880, P173, DOI 10.1007/978-3-030-36617-9_11
[3]
[Anonymous], 2017, Proceedings of the International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
[6]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[7]
Arthur D, 2007, PROCEEDINGS OF THE EIGHTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P1027
[9]
Bhatia T, 2017, 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), DOI 10.1109/CyberSecPODS.2017.8074847
[10]
Bholowalia P., 2014, Int. J. Comput. Appl, V105, P17, DOI DOI 10.5120/18405-9674