共 37 条
[31]
Detecting intrusions using system calls: Alternative data models
[J].
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
1999,
:133-145
[32]
Wuchner T., 2014, Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '14, P271
[33]
Xu Z., 2016, CCS, P504
[34]
Yin H, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P116
[35]
You I., 2010, 2010 INT C BROADBAND, P297, DOI DOI 10.1109/BWCCA.2010.85
[36]
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1105-1116
[37]
Zhong C, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P263, DOI 10.1109/ISI.2013.6578832