共 61 条
[1]
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]
Abijah Roseline S, 2019, COUNTERING CYBER ATT, P211
[3]
Afshar P, 2018, IEEE IMAGE PROC, P3129, DOI 10.1109/ICIP.2018.8451379
[4]
Alazab M., 2019, DEEP LEARNING APPL C
[6]
Alazab M, 2013, ADV INF SECUR PRIV, P293, DOI 10.4018/978-1-4666-2083-4.ch011
[7]
Azab A, 2016, IEEE TRUST BIG, P1788, DOI [10.1109/TrustCom.2016.0275, 10.1109/TrustCom.2016.273]
[8]
Mining Malware To Detect Variants
[J].
2014 5TH CYBERCRIME AND TRUSTWORTHY COMPUTING CONFERENCE CTC,
2014,
:44-53
[9]
Fast authentication in wireless sensor networks
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 55
:362-375