共 17 条
[1]
Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
[3]
Choudhary R., 2012, INT J INFORM TECHNOL, V5, P85
[4]
Cover T., 2006, ELEMENTS INFORM THEO, V2nd, DOI DOI 10.1002/047174882X
[5]
Huang HC, 2010, PICMET 2010: TECHNOLOGY MANAGEMENT FOR GLOBAL ECONOMIC GROWTH, DOI 10.1109/ICCASM.2010.5622193
[6]
Malware Detection by Data Mining Techniques Based on Positionally Dependent Features
[J].
PROCEEDINGS OF THE 18TH EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING,
2010,
:617-623
[7]
Kumar V., 2013, INT J COMPUTER APPL, V61, P16
[8]
Momina Tabish S., 2009, P ACM SIGKDD WORKSH
[9]
Perdisci R., P 7 USENIX C NETW SY
[10]
Perdisci R., P 28 ANN COMP SEC A