共 7 条
[3]
Pawlak Z., 1991, Rough sets: Theoretical aspects of reasoning about data, DOI DOI 10.1007/978-94-011-3534-4
[4]
Data mining methods for detection of new malicious executables
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:38-49
[5]
SZAPPANOS G, 2002, P 12 INT VIR B C
[6]
Neural networks for computer virus recognition
[J].
IEEE EXPERT-INTELLIGENT SYSTEMS & THEIR APPLICATIONS,
1996, 11 (04)
:5-6
[7]
2003, SYMANTEC MANUAL