共 50 条
- [21] Malware defense using network security authentication THIRD IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2005, : 43 - 54
- [22] A PRoactive malware identification system based on the computer hygiene principles Information Management and Computer Security, 2007, 15 (04): : 295 - 312
- [23] A defense framework against malware and vulnerability exploits International Journal of Information Security, 2014, 13 : 439 - 452
- [24] Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized Smoothing COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 683 - 699
- [28] Cloning and the preservation of family integrity LOUISIANA LAW REVIEW, 1999, 59 (04): : 1019 - 1040
- [29] Preservation of Integrity Constraints by Workflow ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011, PT I, 2011, 7044 : 64 - +
- [30] Integrity and Confidentiality Preservation in Cloud 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 419 - 424