共 8 条
[1]
ABE S, 2002, ESANN 2002 P
[3]
Kolter JZ, 2004, P 10 ACM SIGKDD INT
[4]
PIETREK M, 1994, MICROSOFT SYSTEMS J, V9
[5]
Data mining methods for detection of new malicious executables
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:38-49
[6]
WANG S, 2007, COMPUTER APPL, V27
[7]
WANG TY, 2008, IEEE 8 INT C COMP IN
[8]
XU JY, 2004, P 4 INT C HYBR INT S