共 26 条
[1]
Alazab M., 2010, C RES PRACT INF TECH, V121, P171
[2]
Anderson H. S., 2018, ARXIV180404637
[4]
Egelman S, 2013, PROCEEDINGS OF THE 2013 NEW SECURITY PARADIGMS WORKSHOP (NSPW'13), P41
[5]
Fleshman W, 2018, PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2018), P3, DOI 10.1109/MALWARE.2018.8659360
[6]
Harang R., 2018, Measuring the speed of the red queen's race
[8]
Neurlux: Dynamic Malware Analysis Without Feature Engineering
[J].
35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA),
2019,
:444-455
[9]
Jung W., 2015, P 36 IEEE S SEC PRIV, P2
[10]
Kardan N., 2016, ARXIV160902226