共 50 条
- [41] Detection of Malicious Executables Using Static and Dynamic Features of Portable Executable (PE) File [J]. SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 48 - 58
- [42] A Image Texture and BP neural network based Malicious Files Detection Technique for Cloud Storage Systems [J]. 2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 426 - 431
- [43] Data Mining Based Strategy for Detecting Malicious PDF Files [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 661 - 667
- [44] Malicious virtual machines detection through a clustering approach [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 193 - 200
- [45] Identification of Executable Files on the basis of Statistical Criteria [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 202 - 208
- [46] REWRITING EXECUTABLE FILES TO MEASURE PROGRAM BEHAVIOR [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1994, 24 (02): : 197 - 218
- [47] A PSO based malicious node detection and energy efficient clustering in wireless sensor network [J]. 2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 859 - 863
- [48] K-Means Clustering Analysis Based on Adaptive Weights for Malicious Code Detection [J]. 2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 652 - 656
- [49] Robust Federated Learning Based on Metrics Learning and Unsupervised Clustering for Malicious Data Detection [J]. ACMSE 2022: PROCEEDINGS OF THE 2022 ACM SOUTHEAST CONFERENCE, 2022, : 238 - 242