共 8 条
[1]
Agrawal R., 1994, P 20 INT C VER LARG, P487, DOI DOI 10.5555/645920.672836
[3]
CHRISTODORESCU M, 2007, P 6 JOINT M EUR SOFT, P5, DOI DOI 10.1145/1287624.1287628
[4]
Han JW, 2000, SIGMOD RECORD, V29, P1
[5]
DDCFS: A Distributed Dynamic Computer Forensic System Based on Network
[J].
ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS,
2009,
:53-56
[6]
Data mining methods for detection of new malicious executables
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:38-49
[7]
Wang JH, 2003, 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, P71
[8]
Dynamic Network Forensic Based Plug-In Architecture
[J].
ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS,
2009,
:445-+