共 50 条
- [31] Personal privacy, information assurance, and the threat posed by malware technology DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
- [33] A Survey on Cross-Architectural IoT Malware Threat Hunting IEEE ACCESS, 2021, 9 : 91686 - 91709
- [35] Malware Triage for Early Identification of Advanced Persistent Threat Activities DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (03):
- [36] Leopard: Understanding the Threat of Blockchain Domain Name Based Malware PASSIVE AND ACTIVE MEASUREMENT, PAM 2020, 2020, 12048 : 55 - 70
- [38] Feature Reduction to Speed Up Malware Classification INFORMATION SECURITY TECHNOLOGY FOR APPLICATIONS, 2012, 7161 : 176 - 188
- [39] Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior 2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 47 - 52
- [40] Cuckoo's Malware Threat Scoring and Classification: Friend or Foe? 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 678 - 684