共 41 条
[1]
Abdullah MS, 2018, PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC)
[2]
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:183-194
[3]
[Anonymous], 2015, P 2015 ACM INT WORKS
[4]
[Anonymous], Software Assurance Reference Dataset Project
[6]
Effects of Variable Names on Comprehension: An Empirical Study
[J].
2017 IEEE/ACM 25TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC),
2017,
:55-65
[7]
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis
[J].
2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019),
2019,
:109-113
[8]
DeepCPDP: Deep Learning Based Cross-Project Defect Prediction
[J].
IEEE ACCESS,
2019, 7
:184832-184848
[9]
Chen X., 2019, IEEE T RELIAB