共 50 条
- [1] A toolkit for detecting and analyzing malicious software [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 423 - 431
- [2] MalReG: Detecting and Analyzing Malicious Retweeter Groups [J]. PROCEEDINGS OF THE 6TH ACM IKDD CODS AND 24TH COMAD, 2019, : 61 - 69
- [3] Detecting Malicious Websites in Depth through Analyzing Topics and Web-pages [J]. ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 128 - 133
- [5] A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed [J]. MOBILE NETWORKS & APPLICATIONS, 2013, 18 (01): : 122 - 128
- [7] A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed [J]. Mobile Networks and Applications, 2013, 18 : 122 - 128
- [8] Poster: AdHoneyDroid - Capture Malicious Android Advertisements [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1514 - 1516
- [9] Detecting malicious SQL [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 259 - +
- [10] Analyzing Online Political Advertisements [J]. FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL-IJCNLP 2021, 2021, : 3669 - 3680