共 47 条
[1]
Ahmadi M, 2013, COMPUT FRAUD SECUR, P11, DOI 10.1016/S1361-3723(13)70072-1
[2]
[Anonymous], 2010, P ACM S APPL COMP
[3]
[Anonymous], 2013, DAT MIN SOFTW JAV
[4]
[Anonymous], 2011, INT SEC THREAT REP
[5]
[Anonymous], 2010, P 12 ANN C GEN EV CO, DOI DOI 10.1145/1830483.1830703
[6]
[Anonymous], 2013, DIS DEB
[7]
[Anonymous], J COMPUTERS
[8]
Asai T, 2002, SIAM PROC S, P158
[9]
Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs
[J].
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11,
2011,
:181-189
[10]
Chen H., 2002, P 9 ACM C COMPUTER C, P235, DOI DOI 10.1145/586110.586142