共 50 条
- [42] A Lightweight Model for Malicious Code Classification Based on Structural Reparameterisation and Large Convolutional Kernels [J]. International Journal of Computational Intelligence Systems, 17
- [43] A Malicious Mining Code Detection Method Based on Multi-Features Fusion [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2731 - 2739
- [45] Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint Clustering [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1914 - 1921
- [46] A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 801 - 818
- [48] Research on a malicious code behavior acquisition method based on the Bochs virtual machine [J]. CIVIL, ARCHITECTURE AND ENVIRONMENTAL ENGINEERING, VOLS 1 AND 2, 2017, : 1309 - 1312
- [49] Improved Malicious Code Classification Considering Sequence by Machine Learning [J]. 18TH IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE 2014), 2014,