共 50 条
- [1] A Trojan horse Detection Technology Based on Behavior Analysis 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [2] SPID-based Method of Trojan Horse Detection PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION, BUSINESS AND EDUCATION TECHNOLOGY (ICIBET 2013), 2013, 26 : 148 - 151
- [3] The Design and Implementation of the Trojan Horse Based on Kernel Hacking ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2891 - 2894
- [4] Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY, 2015, 315
- [5] Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches 2024 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING, NETWORKING AND APPLICATIONS, MCNA 2024, 2024, : 35 - 41
- [9] The Trojan Horse Method in nuclear astrophysics Physics of Atomic Nuclei, 2011, 74 : 1725 - 1739
- [10] Position paper: Prolepsis on the problem of Trojan-horse-based integrity attacks NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, 1999, : 48 - 51