共 14 条
[1]
Bailey M., 2007, 10 INT C REC ADV INT
[2]
Bonfante Guillaume, 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), P1, DOI 10.1109/MALWARE.2008.4690851
[3]
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost
[J].
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA),
2010,
:721-728
[4]
Cha S.K., 2010, 7 USENIX C NETW SYST
[5]
Flake H., 2004, Proceedings of the Detection of Intrusions and Malware Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, 6-7 July 2004, P161
[6]
Gheorghescu M., 2005, Virus bulletin conference, Citeseer, P294
[7]
Kapoor A., 2006, AVAR 06
[8]
Lee J., 2010, P 2010 ACM S APPL CO, DOI DOI 10.1145/1774088.1774505