共 47 条
[11]
Chen Hao., 2004, NDSS, P171
[12]
Chi Y, 2004, LECT NOTES ARTIF INT, V3056, P63
[13]
Christodorescu M, 2003, P 12 C USENIX SEC S, V12, P12, DOI DOI 10.21236/ADA449067
[14]
Di Cerbo F, 2011, LECT NOTES COMPUT SC, V6540, P138, DOI 10.1007/978-3-642-19376-7_12
[16]
F- Secure, 2007, F SEC REP AM MALW GR
[17]
Feng HH, 2004, P IEEE S SECUR PRIV, P194
[18]
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:45-60
[19]
Griffin K, 2009, LECT NOTES COMPUT SC, V5758, P101, DOI 10.1007/978-3-642-04342-0_6