共 30 条
[2]
[Anonymous], 2012, P 2 ACM WORKSHOP SEC
[3]
[Anonymous], 2012, TRUST TRUSTWORTHY CO
[4]
[Anonymous], 2012, Practical malware analysis: the hands-on guide to dissecting malicious software
[5]
[Anonymous], 1998, EUR C MACH LEARN
[6]
Beresford AR, 2011, P 12 WORKSH MOB COMP, P49
[7]
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[8]
Chakradeo S., 2013, P 6 ACM C SEC PRIV W, P13, DOI DOI 10.1145/2462096.2462100
[9]
Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1, DOI [10.1145/2335356.2335358., DOI 10.1145/2335356.2335358, 10.1145/2335356.2335358]
[10]
Christensen CM, 2007, MIT SLOAN MANAGE REV, V48, P38