共 50 条
- [1] Detecting Applications with Malicious Behavior in Android Device Based on GA and SVM [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2017), 2017, 140 : 257 - 261
- [2] Detecting Malicious Android Applications from Runtime Behavior [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 324 - 329
- [3] Detecting Malicious Applications using System Services Request Behavior [J]. PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 200 - 209
- [4] Detecting Artifact Anomalies in Microservice-Based Financial Applications [J]. 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2020), 2020, : 418 - 421
- [5] Detecting Malicious Facebook Applications [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) : 773 - 787
- [6] A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications [J]. MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 1 - 12
- [7] The Scheme of Detecting Encoded Malicious Web Pages Based on Information Entropy [J]. 2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 310 - 312
- [10] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240