Author:
Feng Pengbin,Yang Li,Lu Di,Xi Ning,Ma Jianfeng
Funder
Natural Science Basic Research Program of Shaanxi
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference70 articles.
1. Java.com, Learn About Java Technology. https://www.java.com/en/
2. Balan G, Popescu AS (2018) Detecting java compiled malware using machine learning techniques. In: 2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE, pp 435–439
3. CVE Details, J, The Ultimate Security Vulnerability Datasource. https://www.cvedetails.com/product/19116/Oracle-JDK.html?vendor_id=93
4. Krebson Security, C, Live Coronavirus Map Used to Spread Malware. https://krebsonsecurity.com/2020/03/live-coronavirus-map-used-to-spread-malware/
5. Coker Z, Maass M, Ding T, Le Goues C, Sunshine J (2015) Evaluating the flexibility of the java sandbox. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp 1–10
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献