共 50 条
- [2] Mining Mobile Internet Packets for Malware Detection [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 481 - 486
- [3] Malware Hiding Malicious Code in the Image and its Detection Method [J]. IEEJ Transactions on Electronics, Information and Systems, 2022, 142 (12): : 1288 - 1294
- [5] DDOFM: Dynamic malicious domain detection method based on feature mining [J]. Computers and Security, 2023, 130
- [6] Lexical Mining of Malicious URLs for Classifying Android Malware [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 248 - 263
- [7] Android Malware Clustering Through Malicious Payload Mining [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 : 192 - 214
- [8] A Malicious Mining Code Detection Method Based on Multi-Features Fusion [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2731 - 2739
- [9] Mining and Detection of Anaroia Malware Based on Permissions [J]. 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 264 - 268
- [10] Mobile Internet Malicious Application Detection Method based on Support Vector Machine [J]. 2017 INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA), 2017, : 260 - 263