共 50 条
- [31] Detecting the Malicious Application using FRAppE [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1027 - 1032
- [32] Detecting Malicious Campaigns in Crowdsourcing Platforms [J]. PROCEEDINGS OF THE 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING ASONAM 2016, 2016, : 197 - 202
- [33] Detecting malicious manipulation in grid enviromments [J]. SBAC-OAD 2006: 18TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING, 2006, : 28 - +
- [34] Detecting Malicious Manipulation of Synchrophasor Data [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2015, : 145 - 150
- [36] On Automatically Detecting Malicious Impostor Emails [J]. APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 33 - 47
- [37] Method for Detecting Unknown Malicious Executables [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 376 - 377
- [38] Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities [J]. 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 655 - 664
- [39] Detecting Malicious Users in Online Dating Application [J]. 5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, : 255 - 260