共 39 条
[1]
Tahir R., A study on malware and malware detection techniques, Int J Edu Mgmt Engg, 8, 2, (2018)
[2]
Faruk M.J., Miner P., Coughlan R., Masum M., Shahriar H., Clincy V., Cetinkaya C., Smart connected aircraft: Towards security, privacy, and ethical hacking, In: International Conference on Security of Information and Networks (SIN). IEEE, pp. 1-5, (2021)
[3]
Zhang K., A machine learning based approach to identify SQL injection vulnerabilities, IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE., pp. 1286-1288, (2019)
[4]
Kim M.S.A., Study on the Attack Index Packet Filtering Algorithm Based on Web Vulnerability, pp. 145-152
[5]
Shandilya S.K., Ganguli C., Izonin I., Nagar A.K., Cyber attack evaluation dataset for deep packet inspection and analysis, Data Brief, 46, (2023)
[6]
Catal C., Giray G., Tekinerdogan B., Applications of deep learning for mobile malware detection: A systematic literature review, Neur Comp Appl, pp. 1-26, (2022)
[7]
Naik N., Jenkins P., Savage N., Yang L., Cyberthreat Hunting-Part 1: Triaging ransomware using fuzzy hashing, import hashing and YARA rules, In: IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). IEEE., pp. 1-6, (2019)
[8]
Mira F., Huang W., Performance evaluation of string based malware detection methods, In: International Conference on Automation and Computing (ICAC). IEEE, pp. 1-6, (2018)
[9]
Xiao X., Zhang S., Mercaldo F., Hu G., Sangaiah A.K., Android malware detection based on system call sequences and LSTM, Multim Tls Appl, 78, pp. 3979-3999, (2019)
[10]
Zhang J., A practical logic obfuscation technique for hardware security, IEEE Trans VLSI sys, 24, 3, pp. 1193-1197, (2015)