共 50 条
- [1] ADAM: Automated Detection and Attribution of Malicious Webpages [J]. INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 3 - 16
- [2] ADAM: Automated Detection and Attribution of Malicious Webpages [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 399 - +
- [4] Deep Learning for Malicious Flow Detection [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
- [7] Malicious Code Detection based on Image Processing Using Deep Learning [J]. PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018), 2018, : 81 - 85
- [8] MALICIOUS ITEMS DETECTION AT PUBLIC PLACES USING DEEP LEARNING METHODS [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2019, 12 (02): : 19 - 30
- [9] Detection of Malicious Binaries by Deep Learning Methods [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 132 - 139
- [10] Detection of Phishing Webpages using Heterogeneous Transfer Learning [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 190 - 197