共 50 条
- [31] Simulating Malicious Users in a Software Reputation System SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 147 - 156
- [32] Intelligent host discovery from malicious software Smart Innovation, Systems and Technologies, 2010, 2 : 119 - 136
- [33] A novel testbed for detection of malicious software functionality ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 292 - +
- [35] A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 130 : 1 - 18
- [36] A method for efficient malicious code detection based on conceptual similarity COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 567 - 576
- [38] Malicious Software Detection utilizing Temporal-Graphs COMPUTER SYSTEMS AND TECHNOLOGIES, 2019, : 49 - 55
- [39] Defending medical information systems against malicious software CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 : 96 - 107
- [40] Recognizing malicious software behaviors with tree automata inference Formal Methods in System Design, 2012, 41 : 107 - 128