共 18 条
[1]
[Anonymous], 2015, P NEUR INF PROC SYST
[2]
[Anonymous], 2009, P ACM INT C IM VID R
[3]
Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
[4]
Desai Priti, 2010, International Journal of Multimedia Intelligence and Security, V1, P402, DOI 10.1504/IJMIS.2010.039240
[5]
Google Codelabs, 2017, TENS POETS TENS POETS
[7]
Hunting for undetectable metamorphic viruses
[J].
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2011, 7 (03)
:201-214
[8]
Limits of static analysis for malware detection
[J].
TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2007,
:421-430
[10]
Nataraj L., 2011, P 8 INT S VIS CYB SE, P1, DOI DOI 10.1145/2016904.2016908