共 50 条
- [41] Malicious code detection based on heterogeneous information network Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 258 - 265
- [43] Efficient Privacy-Preserving Data Mining in Malicious Model ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I, 2010, 6440 : 370 - 382
- [44] Privacy-preserving data mining on data grids in the presence of malicious participants 13TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, : 225 - 234
- [45] Lines of Malicious Code: Insights Into the Malicious Software Industry 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 349 - 358
- [46] An Automated Malicious Host Recognition Model in Cloud Forensics NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 : 61 - 71
- [49] Malicious code detection in compound documents based on spectral analyses Liu, L. (liul@itsec.gov.cn), 1713, Tsinghua University (53):
- [50] A Fast Malicious Code Detection Method Based on Feature Fusion Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (01): : 57 - 66