共 44 条
[1]
Agarap A.F., 2018, THE J
[2]
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:183-194
[3]
Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
[J].
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS),
2020,
:888-898
[4]
Alhanahnah M, 2018, IEEE CONF COMM NETW
[5]
[Anonymous], 2018, HAJIME BOTNET MAKES
[6]
[Anonymous], 2012, Official Gazette of Republic of Serbia
[7]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]
Bendiab G, 2020, PROCEEDINGS OF THE 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2020): BRIDGING THE GAP BETWEEN AI AND NETWORK SOFTWARIZATION, P444, DOI 10.1109/NetSoft48620.2020.9165381
[9]
L(a)ying in (Test)Bed How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification
[J].
INFORMATION SECURITY, ISC 2019,
2019, 11723
:381-401
[10]
Brosch T., 2006, RUNTIME PACKERS HIDD