共 50 条
- [32] Detecting malicious behavior in cooperative diversity [J]. 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, : 895 - +
- [33] A Method for Detecting Unknown Malicious Executables [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 190 - 196
- [34] Detecting malicious code by model checking [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 174 - 187
- [35] Detecting Malicious Fast Flux Domains [J]. MECHATRONICS AND APPLIED MECHANICS, PTS 1 AND 2, 2012, 157-158 : 1264 - 1273
- [36] Detecting Malicious Assembly with Deep Learning [J]. NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 82 - 85
- [37] A Layered Architecture for Detecting Malicious Behaviors [J]. RECENT ADVANCES IN INTRUSION DETECTION, RAID 2008, 2008, 5230 : 78 - +
- [38] Fatih: Detecting and isolating malicious routers [J]. 2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 538 - 547
- [39] Detecting Malicious Authentication Events Trustfully [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
- [40] Detecting the Malicious Application using FRAppE [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1027 - 1032