共 50 条
- [41] MHC-inspired approach for malicious code detection [J]. Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2009, 10 (04): : 344 - 349
- [42] The Algorithm of Malicious Code Detection Based on Data Mining [J]. GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
- [43] An effective malicious code detection mechanism for virtual desktop [J]. Guo, Y. (gy-u@163.com), 1600, Chinese Institute of Electronics (42):
- [44] A Multiple Pattern Matching Method for Malicious Code Detection [J]. JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (02): : 181 - 193
- [45] Power Based Malicious Code Detection Techniques for Smartphones [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 142 - 149
- [46] On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code [J]. Automatic Control and Computer Sciences, 2021, 55 : 827 - 837
- [47] Dynamic Malicious Code Detection Based on Binary Translator [J]. CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 80 - 89
- [49] Malicious code detection for Android using Instruction Signatures [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 332 - 337
- [50] Malicious code detection based on heterogeneous information network [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 258 - 265