共 23 条
[1]
[Anonymous], 2010, 2010 INT C BROADBAND, DOI DOI 10.1109/BWCCA.2010.85
[2]
[Anonymous], 2012, Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No
[4]
Barria Huidobro Cristian, 2018, 2018 7th International Conference on Computers Communications and Control (ICCCC), P183, DOI 10.1109/ICCCC.2018.8390457
[5]
Bekerman D, 2015, IEEE CONF COMM NETW, P134, DOI 10.1109/CNS.2015.7346821
[6]
Detecting Obfuscated Malware using Memory Feature Engineering
[J].
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP),
2021,
:177-188
[7]
XGBoost: A Scalable Tree Boosting System
[J].
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2016,
:785-794
[8]
Dang Quang-Vinh, 2022, Digital Science: DSIC 2021. Lecture Notes in Networks and Systems (381), P525, DOI 10.1007/978-3-030-93677-8_46
[9]
Dang Q.-V., 2021, FDSE 2021, P356, DOI [10.1007/978-3-030-91387-8_23, DOI 10.1007/978-3-030-91387-823]