共 32 条
- [21] Nataraj L., 2011, P 8 INT S VIS CYB SE, P1
- [22] Nataraj L, 2011, P 4 ACM WORKSH SEC A, P21, DOI DOI 10.1145/2046684.2046689
- [23] Pa Yin Minn Pa, 2016, J INF PROCESS, V24, P522, DOI DOI 10.2197/IPSJJIP.24.522
- [24] Popov I, 2017, 2017 SIBERIAN SYMPOSIUM ON DATA SCIENCE AND ENGINEERING (SSDSE), P1, DOI 10.1109/SSDSE.2017.8071952
- [25] Salehi Z, 2014, COMPUT FRAUD SECUR, P9, DOI 10.1016/S1361-3723(14)70531-7
- [26] Santos I, 2009, ICEIS 2009 : PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS, P317
- [27] Saxe J, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P11, DOI 10.1109/MALWARE.2015.7413680
- [28] Data mining methods for detection of new malicious executables [J]. 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 38 - 49
- [29] Shanhu Shang, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P113, DOI 10.1109/MALWARE.2010.5665787
- [30] Spognardi A., 2017, ANAL DDOS CAPABLE IO, P807