Author:
Wen Jie,Ma Jianhua,Huang Runhe,Jin Qun,Chen Jian,Huang Benxiong,Zhong Ning
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Industrial and Manufacturing Engineering,Software
Reference23 articles.
1. Chen Z., Wei P., Delis A. (2008) Catching remote administration trojans (RATs). Software: Practice and Experience, 38(7): 667–703. doi: 10.1002/spe.837
2. Chira, O., Chira, C., Roche, T., Tormey, D., & Brennan, A. (2006). An agent-based approach to knowledge management in distributed design. Journal of Intelligent Manufacturing, 17(6), 737–750. doi: 10.1007/s10845-006-0042-0 .
3. Christodorescu, M., Jha, S., Seshia, S. A., Song, D., & Bryant, R. E. (2005). Semantics-aware malware detection. In IEEE symposium on security and privacy, 2005 (pp. 32–46). doi: 10.1109/SP.2005.20 .
4. Clarke R. (1994) The digital persona and its application to data surveillance. The Information Society, 10(2): 77–92. doi: 10.1080/01972243.1994.9960160
5. Ghosh, A. K., Schwartzbard, A., & Schatz, M. (1999). Learning program behavior profiles for intrusion detection. In: Conference on workshop on intrusion detection and network monitoring, 1999(Vol. 1, pp. 51–62).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. W2T Framework Based U-Pillbox System Towards U-Healthcare for the Elderly;Wisdom Web of Things;2016
2. Wear-I: A New Paradigm in Wearable Computing (Invited Paper);2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing;2015-10
3. Digital Explosions and Digital Clones;2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom);2015-08