共 44 条
- [1] Alzahrani A, 2018, INT CONF ELECTRO INF, P892, DOI 10.1109/EIT.2018.8500161
- [2] Anandarajan M., 2019, Practical Text Analytics: Maximizing the Value of Text Data
- [3] Aresu M, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P128, DOI 10.1109/MALWARE.2015.7413693
- [4] Cabaj Krzysztof., 2016, CoRR
- [5] Chen J., 2018, IEEE T INF FORENSICS, V13
- [6] Cohen F., 1986, THESIS
- [7] ShieldFS: A Self-healing, Ransomware-aware Filesystem [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 336 - 347
- [9] Cuzzocrea A., 2018, 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), P1
- [10] Enck W, P 20 USENIX SEC S