共 25 条
[1]
Aljawarneh Shadi, 2011, Network Security, V2011, P12, DOI 10.1016/S1353-4858(11)70026-5
[3]
Arce I., 2005, VULNERABILITY
[4]
Bayoglu B., 2008, POLYMORPHIC WORM DET
[5]
Towards automatic generation of vulnerability-based signatures
[J].
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2006,
:2-+
[6]
Chang V., 2015, IEEE T COMPUT SERV, V99
[7]
Cloud computing adoption framework: A security framework for business clouds
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2016, 57
:24-41
[8]
Du Z., 2004, IMPROVEMENT NEEDLEME
[9]
Gundy M.V., 2007, FEATURE OMISSION VUL
[10]
Kim H.-A., 2010, PRIVACY PRESERVING D