共 50 条
- [1] Detecting Malicious PowerShell Commands using Deep Neural Networks [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 187 - 197
- [2] Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts [J]. 2022 52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2022), 2022, : 295 - 306
- [4] Detecting Malicious Assembly with Deep Learning [J]. NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 82 - 85
- [5] Detecting Semantic Code Clones by Building AST-based Markov Chains Model [J]. PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,
- [6] An AST-based approach to classifying defects [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), 2015, : 14 - 21
- [9] AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection [J]. SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 207 - 224
- [10] OMRDetector: A Method for Detecting Obfuscated Malicious Requests Based on Deep Learning [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (10): : 2167 - 2189