共 50 条
- [11] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240
- [12] Researches on deobfuscation against malicious code obfuscated with conditional jumps [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 1093 - 1099
- [13] JAST: Fully Syntactic Detection of Malicious (Obfuscated) Java']JavaScript [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 303 - 325
- [15] Portable executable Scoring: What is your Malicious score? [J]. 2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,
- [16] Detection of Malicious Executable Files Based on Clustering of Activities [J]. Automatic Control and Computer Sciences, 2021, 55 : 1092 - 1098
- [17] Static analysis of the disassembly against malicious code obfuscated with conditional jumps [J]. 7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 525 - 530
- [18] OMRDetector: A Method for Detecting Obfuscated Malicious Requests Based on Deep Learning [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (10): : 2167 - 2189
- [19] Detecting a malicious executable without prior knowledge of its patterns [J]. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 1 - 12
- [20] Detecting Malicious Code in Executable Programs with the Principle of Danger Theory [J]. ICAIE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND EDUCATION, VOLS 1 AND 2, 2009, : 495 - 500