共 53 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[3]
Aresu M, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P128, DOI 10.1109/MALWARE.2015.7413693
[4]
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
[J].
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014),
2014,
[5]
Baldangombo U, 2013, arXiv preprint arXiv:1308.2831
[6]
Battista Pasquale, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P542
[7]
Bayer U., 2009, NETW DISTRIB SYST SE
[8]
Biggio B., 2014, Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop - AISec'14, P27, DOI DOI 10.1145/2666652.2666666
[9]
Code obfuscation techniques for metamorphic viruses
[J].
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2008, 4 (03)
:211-220
[10]
Bugiel S., 2011, TECH REP T 2011 04