共 34 条
[1]
A Johnson, 2013, P 2013 ACM SIGSAC C, P337
[2]
Abdulla R.S., 2013, International Journal of Computer Science Issues (IJCSI), V10, P208
[3]
[Anonymous], 2006, P 23 INT C MACHINE L, DOI DOI 10.1145/1143844.1143874
[4]
[Anonymous], 2013, P 7 INT C EM SEC INF
[5]
[Anonymous], P 17 ACM SIGKDD INT
[6]
Structural entropy and metamorphic malware
[J].
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2013, 9 (04)
:179-192
[7]
On the Analysis of the Zeus Botnet Crimeware Toolkit
[J].
PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST,
2010,
:31-38
[8]
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:80-94
[10]
Burghouwt P, 2011, LECT NOTES COMPUT SC, V7093, P131, DOI 10.1007/978-3-642-25560-1_9