共 25 条
- [1] [Anonymous], 2012, Practical malware analysis: the hands-on guide to dissecting malicious software
- [4] GEOMETRICAL AND STATISTICAL PROPERTIES OF SYSTEMS OF LINEAR INEQUALITIES WITH APPLICATIONS IN PATTERN RECOGNITION [J]. IEEE TRANSACTIONS ON ELECTRONIC COMPUTERS, 1965, EC14 (03): : 326 - &
- [5] Desallova Ltda, 2013, VIRT PROT TOOLS MOL
- [6] Guo FL, 2008, LECT NOTES COMPUT SC, V5230, P98
- [7] Hsu C.W., 2010, PRACTICAL GUIDE SUPP
- [8] A METHOD FOR THE CONSTRUCTION OF MINIMUM-REDUNDANCY CODES [J]. PROCEEDINGS OF THE INSTITUTE OF RADIO ENGINEERS, 1952, 40 (09): : 1098 - 1101
- [9] Jacob Gregoire, 2013, Detection of Intrusions and Malware, and Vulnerability Assessment. 9th International Conference, DIMVA 2012. Revised Selected Papers, P102, DOI 10.1007/978-3-642-37300-8_6
- [10] Kang MG, 2007, WORM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON RECURRING MALCODE, P46