共 67 条
- [51] Rieck K, 2010, J MACH LEARN RES, V11, P555
- [52] PolyUnpack: Automating the hidden-code extraction of unpack-executing malware [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 289 - +
- [53] VECTOR-SPACE MODEL FOR AUTOMATIC INDEXING [J]. COMMUNICATIONS OF THE ACM, 1975, 18 (11) : 613 - 620
- [54] SCHULTZ MG, 2001, P IEEE S SEC PRIV OA
- [55] Sharif M., 2009, P IEEE S SEC PRIV OA
- [56] Shawe-Taylor J., 2004, KERNEL METHODS PATTE, DOI DOI 10.1017/CBO9780511809682
- [57] SONG D, 2008, P 4 INT C INF SYST S
- [58] Stolfo SJ, 2007, ADV INFORM SECUR, P231
- [59] Symantec, 2008, INT SEC THREAT REP, VXIV
- [60] Szor Peter, 2005, ART COMPUTER VIRUS R