共 15 条
- [1] Semantics-aware malware detection [J]. 2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 32 - 46
- [2] Cormen T. H., 2001, Introduction to Algorithms, V2nd
- [3] Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd, DOI [DOI 10.1002/0471200611, 10.1002/0471200611]
- [5] A threshold of in n for approximating set cover [J]. JOURNAL OF THE ACM, 1998, 45 (04) : 634 - 652
- [6] Kephart J.O., 1994, P 4 VIRUS B INT C, P178
- [7] KIM HA, 2004, USENIX SECURITY S
- [8] ON THE HARDNESS OF APPROXIMATING MINIMIZATION PROBLEMS [J]. JOURNAL OF THE ACM, 1994, 41 (05) : 960 - 981
- [9] Maurer W. D., 1975, Computing Surveys, V7, P5, DOI 10.1145/356643.356645
- [10] RYSAVY P, 1999, EVOLUTION CELLULAR D