共 50 条
- [1] Online detect polymorphic exploit based on data mining [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,
- [2] Honeypot-based Signature Generation for Polymorphic Worms [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 101 - 114
- [4] Signature Tree Generation for Polymorphic Worms [J]. IEEE TRANSACTIONS ON COMPUTERS, 2011, 60 (04) : 565 - 579
- [8] A Fast Method of Signature Generation for Polymorphic Worms [J]. ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 8 - 13
- [10] Data-mining by probability-based patterns [J]. PROCEEDINGS OF THE ITI 2008 30TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2008, : 353 - +