共 50 条
- [22] Mining malicious corruption of data with Hidden Markov models RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 175 - 189
- [23] Data mining methods for detection of new malicious executables 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 38 - 49
- [25] DataRinse: Semantic Transforms for Data preparation based on Code Mining PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (12): : 4090 - 4093
- [28] Detecting Faulty and Malicious Vehicles Using Rule-based Communications Data Mining 2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 827 - 834
- [29] Risk Prediction of Malicious Code-Infected Websites by Mining Vulnerability Features INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 291 - 294
- [30] Immunity-Based Model for Malicious Code Detection ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 6215 : 399 - 406