共 18 条
- [11] Performance analysis of exponential backoff [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2005, 13 (02) : 343 - 355
- [13] Matsumoto M., 1998, ACM Transactions on Modeling and Computer Simulation, V8, P3, DOI 10.1145/272991.272995
- [14] A Friend or a Foe? Detecting Malware using Memory and CPU Features [J]. SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 73 - 84
- [15] Santha M., 1984, 25th Annual Symposium on Foundations of Computer Science (Cat. No. 84CH2085-9), P434, DOI 10.1109/SFCS.1984.715945
- [16] Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (01):
- [17] Research on the Security Criteria of Hash Functions in the Blockchain [J]. PROCEEDINGS OF THE 2ND ACM WORKSHOP ON BLOCKCHAINS, CRYPTOCURRENCIES, AND CONTRACTS (BCC'18), 2018, : 47 - 55
- [18] Where Is Current Research on Blockchain Technology?-A Systematic Review [J]. PLOS ONE, 2016, 11 (10):