共 50 条
- [21] Modeling software integration scenarios for telecommunications operations software vendors 2007 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-4, 2007, : 49 - +
- [23] Indicators system of innovation capacity of software vendors and its application FRONTIERS IN ENTERPRISE INTEGRATION, 2008, : 285 - 290
- [24] About malicious software in smartphones JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (02): : 109 - 119
- [25] Analysis of Mirai Malicious Software 2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 416 - 420
- [26] Research On Detection Of Malicious Software 2021 2ND INTERNATIONAL CONFERENCE ON E-COMMERCE AND INTERNET TECHNOLOGY (ECIT 2021), 2021, : 400 - 403
- [27] The Similarity Analysis of Malicious Software 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 161 - 168
- [29] A classification of malicious software attacks CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 827 - 832