共 50 条
- [1] A kind of Malicious Code Detection Scheme based on Fuzzy Reasoning [J]. 2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 19 - 22
- [2] Malicious Code Utilization Chain Detection Scheme based on Abstract Syntax Tree [J]. 2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1108 - 1111
- [3] Malicious Code Detection Based on Code Semantic Features [J]. IEEE ACCESS, 2020, 8 : 176728 - 176737
- [4] Malicious Code Classification Method Based on Deep Forest [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1454 - 1464
- [5] Detection technology of malicious code based on semantic [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19543 - 19555
- [6] Malicious Code Detection Based on Software Fingerprint [J]. PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (ICAISE 2013), 2013, 37 : 212 - 216
- [7] Detection technology of malicious code based on semantic [J]. Multimedia Tools and Applications, 2017, 76 : 19543 - 19555
- [9] BIM Modeling-Based Full-Lifecycle Carbon Emissions Model Study on Ancillary Building Facilities of Highway [J]. CICTP 2020: TRANSPORTATION EVOLUTION IMPACTING FUTURE MOBILITY, 2020, : 3536 - 3547