共 30 条
[1]
Ahmad SF, 2015, EL INF TECHN INT P I, P17
[2]
[Anonymous], 2017, KNOWLEDGE INFORM SYS
[3]
[Anonymous], 1961, Adaptive Control Processes: a Guided Tour, DOI DOI 10.1515/9781400874668
[4]
[Anonymous], 2013, AUT MALW AN
[5]
[Anonymous], 2012, Proceedings of ACM Symposium on Access Control Models and Technologies
[6]
Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
[7]
Cesare S., 2012, Software Similarity and Classification
[8]
Dini Gianluca, 2012, Computer Network Security. Proceedings 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, P240, DOI 10.1007/978-3-642-33704-8_21
[10]
Gorecki C, 2011, LECT NOTES COMPUT SC, V6976, P208, DOI 10.1007/978-3-642-24550-3_17