Author:
Le Tran Duc,Do Phuc Hao,Nguyen Duc Tai,Phung Van Thang,Nguyen Cong Danh,Dinh Truong Duy
Publisher
Springer International Publishing
Reference17 articles.
1. Mohanta, A., Saldanha, A.: Persistence Mechanisms. In: Malware Analysis and Detection Engineering, pp. 213–236. Apress, Berkeley (2020)
2. Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of things: Security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180–187, 2015. Afianian, A., Niksefat, S., Sadeghiyan, B., Baptiste, D.: Malware dynamic analysis evasion techniques: a survey. ACM Comput. Surveys 52(6), 1–28 (2019)
3. Alaeiyan, M., Parsa, S., Conti, M.: Analysis and classification of context-based malware behavior. Comput. Commun. 136, 76–90 (2019)
4. McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication efficient learning of deep networks from decentralized data. In: Singh, A., Zhu, J. (Eds.) Artificial Intelligence and Statistics. In: Proceedings of Machine LearningResearch, vol. 54, pp. 1273–1282. PMLR, Fort Lauderdale (2017)
5. Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 1–19 (2019)