Author:
Mehnaz Shagufta,Mudgerikar Anand,Bertino Elisa
Publisher
Springer International Publishing
Reference32 articles.
1. Lecture Notes in Computer Science;N Andronio,2015
2. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;BM Bowen,2009
3. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001).
https://doi.org/10.1023/A:1010933404324
4. Cabaj, K., Gregorczyk, M., Mazurczyk, W.: Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics. CoRR abs/1611.08294 (2016)
5. Calvet, J., Fernandez, J.M., Marion, J.Y.: Aligot: cryptographic function identification in obfuscated binary programs. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 169–182. ACM, New York (2012).
https://doi.org/10.1145/2382196.2382217
Cited by
84 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献