共 50 条
- [2] Malicious Code Detection Using Opcode Running Tree Representation [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 616 - 621
- [3] Malicious Code Utilization Chain Detection Scheme based on Abstract Syntax Tree [J]. 2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1108 - 1111
- [6] Malicious Code Detection Based on Code Semantic Features [J]. IEEE ACCESS, 2020, 8 : 176728 - 176737
- [7] Detection of malicious code in user mode [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 146 - 149
- [8] Malicious code detection for open firmware [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 403 - 412
- [9] An improved malicious code intrusion detection method based on target tree for space information network [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12):
- [10] Detection technology of malicious code based on semantic [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19543 - 19555