共 150 条
[1]
Adelstein F., Stillerman M., Kozen D., Malicious code detection for open firmware, In 18Th Annual Computer Security Applications Conference, pp. 403-412, (2002)
[2]
Albanese M., Jajodia S., Noel S., Time-efficient and cost-effective network hardening using attack graphs, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp. 1-12, (2012)
[3]
Alrabaee S., Saleem N., Preda S., Wang L., Debbabi M., Oba2: an onion approach to binary code authorship attribution, Digit Investig, 11, pp. S94-S103, (2014)
[4]
Alrabaee S., Shirani P., Debbabi M., Wang L., On the feasibility of malware authorship attribution, International Symposium on Foundations and Practice of Security, pp. 256-272, (2016)
[5]
Alshamrani A., Myneni S., Chowdhary A., Huang D., A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities, IEEE Commun Surv Tutor, 21, 2, pp. 1851-1877, (2019)
[6]
Altaher A., An improved android malware detection scheme based on an evolving hybrid neuro-fuzzy classifier (ehnfc) and permission-based features, Neural Comput Appl, 28, 12, pp. 4147-4157, (2017)
[7]
Antoine L., Joan C., Francois M., Fernandez Jose M., Survey of publicly available reports on advanced persistent threat actors, Comput Secur, 72, pp. 26-59, (2018)
[8]
Smoke Loader, (2020)
[9]
Austin T.H., Filiol E., Josse S., Stamp M., Exploring hidden markov models for virus analysis: A semantic approach, In 2013 46Th Hawaii International Conference on System Sciences, pp. 5039-5048, (2013)
[10]
Beaucamps P., Advanced polymorphic techniques, Int J Comput Sci, 2, 3, pp. 194-205, (2007)