共 18 条
[13]
Matsumoto M., 1998, ACM Transactions on Modeling and Computer Simulation, V8, P3, DOI 10.1145/272991.272995
[14]
A Friend or a Foe? Detecting Malware using Memory and CPU Features
[J].
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4,
2016,
:73-84
[15]
Santha M., 1984, 25th Annual Symposium on Foundations of Computer Science (Cat. No. 84CH2085-9), P434, DOI 10.1109/SFCS.1984.715945
[16]
Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features
[J].
DIGITAL THREATS: RESEARCH AND PRACTICE,
2020, 1 (01)
[17]
Research on the Security Criteria of Hash Functions in the Blockchain
[J].
PROCEEDINGS OF THE 2ND ACM WORKSHOP ON BLOCKCHAINS, CRYPTOCURRENCIES, AND CONTRACTS (BCC'18),
2018,
:47-55