共 50 条
- [21] Software piracy attacks on java software using malicious aspects J. Internet Technol., 2007, 1 (97-108):
- [22] Software Malicious Behavior Analysis Model based on System Call and Function Interface 2019 9TH IEEE ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (IEEE-CYBER 2019), 2019, : 59 - 64
- [23] Dynamic analysis of malicious behavior propagation based on feature selection in software network FRONTIERS IN PHYSICS, 2024, 12
- [24] Threat Analysis and Malicious User Detection in Reputation Systems using Mean Bisector Analysis and Cosine Similarity (MBACS) 2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,
- [25] Malicious Code Detection Based on Software Fingerprint PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (ICAISE 2013), 2013, 37 : 212 - 216
- [26] Monitoring and Diagnosing Malicious Attacks with Autonomic Software CONCEPTUAL MODELING - ER 2009, PROCEEDINGS, 2009, 5829 : 84 - 98
- [27] Handling Malicious Switches in Software Defined Networks NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 1245 - 1248
- [29] Exploring the Long Tail of (Malicious) Software Downloads 2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 391 - 402
- [30] Malicious and Harmless Software in the Domain of System Utilities PROCEEDINGS OF THE 2019 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2019, : 237 - 246