共 50 条
- [1] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240
- [2] A Malicious Code Detection Method Based on Ensemble Learning of Behavior [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (04): : 89 - 95
- [3] Malicious code detection and prevention in virtual behavior mechanism [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2010, 32 (01): : 101 - 106
- [5] Detecting malicious Java']Java code using virtual machine auditing [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 153 - 167
- [6] Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint Clustering [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1914 - 1921
- [10] Malicious Code Classification Method Based on Deep Forest [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1454 - 1464