共 50 条
- [21] Detecting image based spam email [J]. ADVANCES IN HYBRID INFORMATION TECHNOLOGY, 2007, 4413 : 168 - 177
- [22] Detecting Unwanted Email Using VAT [J]. SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING 2011, 2011, 368 : 113 - 126
- [23] Detecting Targeted Malicious E-Mail Using Linear Regression Algorithm with Data Mining Techniques [J]. COMPUTATIONAL INTELLIGENCE IN DATA MINING, CIDM 2016, 2017, 556 : 23 - 35
- [24] Detecting Malicious Driving with Machine Learning [J]. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
- [25] Proposal of a method detecting malicious processes [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 518 - 523
- [26] Malicious Event Detecting in Twitter Communities [J]. INTELLIGENT INTERACTIVE MULTIMEDIA SYSTEMS AND SERVICES 2016, 2016, 55 : 63 - 72
- [28] Analyzing and Detecting Malicious Flash Advertisements [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 363 - 372
- [29] A toolkit for detecting and analyzing malicious software [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 423 - 431
- [30] Detecting Malicious Activity with DNS Backscatter [J]. IMC'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INTERNET MEASUREMENT CONFERENCE, 2015, : 197 - 210