共 50 条
- [33] Agent-based approach to conforming behavior analysis in a cyber-market [J]. PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : A887 - A890
- [34] Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 146 - 160
- [35] Behavior-Based Detection for Malicious Script-Based Attack [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 97 - 103
- [36] BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 417 - 424
- [38] Automatic Detection and Analysis towards Malicious Behavior in IoT Malware [J]. 2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 1332 - 1341
- [40] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240