共 18 条
[1]
Christodorescu M, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P169
[2]
Dahl GE, 2013, INT CONF ACOUST SPEE, P3422, DOI 10.1109/ICASSP.2013.6638293
[3]
Polymorphic Malware Detection Using Sequence Classification Methods
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016),
2016,
:81-87
[5]
IDA, 2013, ID DIS DEB
[6]
Mikolov T., 2013, P 26 INT C NEURAL IN, P3111
[7]
Pascanu R, 2015, INT CONF ACOUST SPEE, P1916, DOI 10.1109/ICASSP.2015.7178304
[8]
Popov I, 2017, 2017 SIBERIAN SYMPOSIUM ON DATA SCIENCE AND ENGINEERING (SSDSE), P1, DOI 10.1109/SSDSE.2017.8071952
[10]
Saxe J, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P11, DOI 10.1109/MALWARE.2015.7413680