共 50 条
- [41] Behavioral biometrics for verification and recognition of malicious software agents SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE VII, 2008, 6943
- [42] DISCOVERING MALICIOUS SIGNATURES IN SOFTWARE FROM STRUCTURAL INTERACTIONS 2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 4845 - 4849
- [43] Malicious mobile software agents: A categorisation of defence initiatives 10TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 1997, : 76 - 79
- [45] A Differential Coefficient Inspired Method for Malicious Software Detection 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 130 - 133
- [46] A Measurement Study on Interprocess Code Propagation of Malicious Software DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 264 - 282
- [47] On the Similarity of Software Development Documentation ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 1030 - 1033
- [48] Optimization of Protection of Computer Networks against Malicious Software PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE STABILITY AND OSCILLATIONS OF NONLINEAR CONTROL SYSTEMS (PYATNITSKIY'S CONFERENCE), 2016,
- [50] Implementation for Malicious Software Using ChatGPT-4 ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2024, 2024, 14977 : 234 - 243