共 55 条
[13]
Burguera I., 2011, P 1 ACM WORKSHOP SEC, P15
[14]
Chaba S, 2017, ARXIV170908805
[15]
Davis L., 1991, Handbook of Genetic Algorithms
[16]
Di Cerbo F, 2011, LECT NOTES COMPUT SC, V6540, P138, DOI 10.1007/978-3-642-19376-7_12
[17]
Edge KS, 2006, GECCO 2006: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, P103
[18]
Felt AP, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P627
[19]
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:45-60
[20]
Ganin Y, 2016, J MACH LEARN RES, V17