共 50 条
- [41] Malware Analysis: The Art of Detecting Malicious Activities [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 51 - 59
- [42] Detecting malicious Java']JavaScript code in Mozilla [J]. ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 85 - 94
- [43] On the feasibility of detecting injections in malicious npm packages [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
- [44] DETECTING AND CONTAINING MALICIOUS SERVICES IN AN INTERCLOUD ENVIRONMENT [J]. JOURNAL OF WEB ENGINEERING, 2016, 15 (5-6): : 521 - 538
- [45] Detecting malicious activities through port profiling [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1999, E82D (04): : 784 - 792
- [46] PLATPAL: Detecting Malicious Documents with Platform Diversity [J]. PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 271 - 287
- [47] Detecting Malicious URLs Using Lexical Analysis [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 467 - 482
- [48] Detecting malicious peers in overlay multicast streaming [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 499 - +
- [49] Detecting algorithmically generated malicious domain names [J]. Proc. ACM SIGCOMM Internet Meas. Conf. IMC, (48-61):
- [50] Detecting Malicious Domains via Graph Inference [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 1 - 18