共 50 条
- [1] A model of attacks of malicious hosts against mobile agents [J]. OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 299 - 299
- [2] Protecting mobile agents against malicious hosts by intention spreading [J]. INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, PROCEEDINGS, 1999, : 725 - 729
- [3] An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (11): : 1446 - 1462
- [4] Detecting Mobile Malicious Webpages in Real Time [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (08) : 2184 - 2197
- [5] A Real Time Approach for Detecting Mobile Malicious WebPages [J]. INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
- [6] Host revocation authority:: A way of protecting mobile agents from malicious hosts [J]. WEB ENGINEERING, PROCEEDINGS, 2003, 2722 : 289 - 292
- [7] A Detecting Method for Malicious Mobile Application Based on Incremental SVM [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1246 - 1250
- [8] Detecting tenders based on Mobile agents [J]. 10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 1114 - 1119
- [9] Profile-based security against malicious mobile agents [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2006, 4093 : 1017 - 1024
- [10] Detecting and blocking malicious traffic caused by IRC protocol based botnets [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 485 - 489