共 37 条
[1]
Akritidis P, 2005, INT FED INFO PROC, V181, P375
[2]
Chen S, 2016, RES IMPLEMENTATION A
[3]
Chen YZ, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2343
[4]
Collberg C., 1997, A taxonomy of obfuscating transformations
[5]
[杜学绘 Du Xuehui], 2019, [通信学报, Journal on Communications], V40, P118
[6]
FBI, BEC SCAMS ACC HALF C
[7]
A Systematic Method on PDF Privacy Leakage Issues
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:1020-1029
[9]
Obfuscated VBA Macro Detection Using Machine Learning
[J].
2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN),
2018,
:490-501
[10]
Identifying image spam based on header and file properties using C4.5 decision trees and support vector machine learning
[J].
2007 IEEE INFORMATION ASSURANCE WORKSHOP,
2007,
:255-+