共 50 条
- [2] Replacement Attacks on Behavior Based Software Birthmark INFORMATION SECURITY, 2011, 7001 : 1 - +
- [3] Shadow attacks: automatically evading system-call-behavior based malware detection JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (1-2): : 1 - 13
- [5] Automatically evading IDS using GP authored attacks 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN SECURITY AND DEFENSE APPLICATIONS, 2007, : 153 - +
- [6] A Behavior-based Method for Detecting DNS Amplification Attacks 2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 608 - 613
- [10] Research on a Behavior-Based Software Test Process Model ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 114 - +