共 42 条
[3]
Alazab M., 2010, Proceedings Second Cybercrime and Trustworthy Computing Workshop (CTC 2010), P52, DOI 10.1109/CTC.2010.8
[6]
Bonfante G, 2013, PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), P109, DOI 10.1109/MALWARE.2013.6703692
[8]
CERT-UK, 2014, INTR MALW
[9]
Clark A, 2013, P AMER CONTR CONF, P4140
[10]
Firdaus A., 2018, J MED SYST, V42, DOI [10.1007/x10916-018-0966-x.112:1-112:23, DOI 10.1007/X10916-018-0966-X.112:1-112:23]