共 25 条
[1]
Alam Mohammed S., 2013, 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, Physical and Social Computing (CPSCom), P663, DOI 10.1109/GreenCom-iThings-CPSCom.2013.122
[2]
[Anonymous], ENCY DATABASE SYSTEM
[3]
Bergeron J., 2001, Int. J. of Req. Eng
[4]
Bishop M.A., 2002, The Art and Science of Computer Security
[5]
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[6]
Chan PPK, 2014, INT CONF MACH LEARN, P82, DOI 10.1109/ICMLC.2014.7009096
[7]
Cifuentes C, 1997, INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, P188
[9]
Fedler R, 2013, PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), P77, DOI 10.1109/MALWARE.2013.6703688
[10]
Firdausi I., 2010, 2010 Proceedings of Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT 2010), P201, DOI 10.1109/ACT.2010.33