共 40 条
[1]
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:183-194
[2]
Akhtar T, 2018, P IEEE INT C CONS EL, P1
[3]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[4]
Andrus J, 2011, SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P173
[5]
[Anonymous], 2015, J. Inf. Privacy Secur, DOI [10.1080/15536548.2015.1073510, DOI 10.1080/15536548.2015.1073510]
[6]
[Anonymous], NON TRADITIONAL REF
[7]
[Anonymous], 2011, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, DOI [10.1145/2184489.2184500, DOI 10.1145/2184489.2184500]
[8]
[Anonymous], TECH REP
[9]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[10]
Bartel A, 2012, IEEE INT CONF AUTOM, P274, DOI 10.1145/2351676.2351722