共 50 条
- [31] Research on the Method of Automatic Programming NC Code for Plasma Cutting Machine Based on DXF [J]. INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY AND ENVIRONMENT PROTECTION (ICSEEP 2015), 2015, : 915 - 922
- [32] A Malicious Mining Code Detection Method Based on Multi-Features Fusion [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2731 - 2739
- [34] A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 801 - 818
- [36] Deep visualization classification method for malicious code based on Ngram-TFIDF [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (06): : 160 - 175
- [37] Research on virtual machine resources dynamic allocation method based on revenue in cloud computing [J]. Journal of Computational Information Systems, 2013, 9 (22): : 9235 - 9242
- [38] A Machine Learning Based Reputation System for Defending Against Malicious Node Behavior [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,