共 79 条
[1]
Dissecting the Android Bouncer, (2015)
[2]
Addision P.S., The illustrated wavelet transform handbook: introductory theory and applications in science, engineering, medicine and finance, (2002)
[3]
Al-Kahtani M.S., Survey on security attacks in vehicular ad hoc networks (Vanets), 6Th International Conference on Signal Processing and Communication Systems (ICSPCS), 2012, pp. 1-9, (2012)
[4]
Al-rimy B.A.S., Maarof M.A., Shaid S.Z.M., Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions, Comput Secur, (2018)
[5]
Andronio N., Zanero S., Maggi F., Heldroid: Dissecting and detecting mobile ransomware, International Workshop on Recent Advances in Intrusion Detection, pp. 382-404, (2015)
[6]
Athanasiadis I.N., Kaburlasos V.G., Mitkas P.A., Petridis V., Applying Machine Learning Techniques on Air Quality Data for Real-Time Decision Support, (2003)
[7]
Baccouche M., Mamalet F., Wolf C., Garcia C., Baskurt A., Sequential deep learning for human action recognition, International Workshop on Human Behavior Understanding, pp. 29-39, (2011)
[8]
Barker J., Hannay P., Szewczyk P., Using traffic analysis to identify the second generation onion router, IFIP 9Th International Conference on Embedded and Ubiquitous Computing (EUC), 2011, pp. 72-78, (2011)
[9]
Battista P., Mercaldo F., Nardone V., Santone A., Visaggio C.A., Identification of android malware families with model checking, In: Proceedings of the 2Nd International Conference on Information Systems Security and Privacy, ICISSP 2016, pp. 542-547, (2016)
[10]
Baysa D., Low R.M., Stamp M., Structural entropy and metamorphic malware, J Comput Virol Hacking Tech, 9, 4, pp. 179-192, (2013)