共 50 条
- [1] Run-time malware detection based on IRP [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2011, 39 (02): : 113 - 117
- [2] Evaluation of run-time detection of self-replication in binary executable malware [J]. 2006 IEEE Information Assurance Workshop, 2006, : 184 - 191
- [3] Ensemble Learning for Effective Run-Time Hardware-Based Malware Detection: A Comprehensive Analysis and Classification [J]. 2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
- [4] Run-time selection of the checkpoint interval in Time Warp based simulations [J]. Simul Pract Theory, 5 (461-478):
- [5] Model-based run-time error detection [J]. MODELS IN SOFTWARE ENGINEERING, 2008, 5002 : 225 - 236
- [6] Run-time selection of the checkpoint interval in Time Warp based simulations [J]. Simulation Practice and Theory, 1998, 6 (05): : 461 - 478
- [7] Run-time detection of heap-based overflows [J]. USENIX ASSOCIATION PROCEEDINGS OF THE SEVENTEENTH LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2003, : 51 - 59
- [8] MalAware: Effective and Efficient Run-time Mobile Malware Detector [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 270 - 277
- [9] Run-time detection of covert channels [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 577 - +
- [10] The Importance of Run-Time Error Detection [J]. TOOLS FOR HIGH PERFORMANCE COMPUTING 2009, 2010, : 145 - 155