共 27 条
[1]
Android Ransomware Detection Based on Dynamic Obtained Features
[J].
RECENT ADVANCES ON SOFT COMPUTING AND DATA MINING (SCDM 2020),
2020, 978
:121-129
[2]
Abuthawabeh MKA, 2019, INT ARAB CONF INF TE, P42, DOI [10.1109/acit47987.2019.8991114, 10.1109/ACIT47987.2019.8991114]
[3]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[4]
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[6]
PERFORMANCE COMPARISON OF FPGA, GPU AND CPU IN IMAGE PROCESSING
[J].
FPL: 2009 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS,
2009,
:126-131
[7]
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2016, 18 (02)
:1153-1176
[10]
Android Security: A Survey of Issues, Malware Penetration, and Defenses
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2015, 17 (02)
:998-1022