共 50 条
- [1] Similarity analysis of malicious executables ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 225 - 232
- [2] Analysis of Mirai Malicious Software 2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 416 - 420
- [3] On malicious software classification 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION WORKSHOP: IITA 2008 WORKSHOPS, PROCEEDINGS, 2008, : 368 - 371
- [4] Lines of Malicious Code: Insights Into the Malicious Software Industry 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 349 - 358
- [5] About malicious software in smartphones JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (02): : 109 - 119
- [6] Research On Detection Of Malicious Software 2021 2ND INTERNATIONAL CONFERENCE ON E-COMMERCE AND INTERNET TECHNOLOGY (ECIT 2021), 2021, : 400 - 403
- [7] A classification of malicious software attacks CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 827 - 832
- [8] The Art of Anti Malicious Software 2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 595 - 599
- [9] Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 : 73 - 97
- [10] Malicious Domain Detection Based on Traffic Similarity 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 416 - 421