Author:
Yoo Suyeon,Kim Sungjin,Kim Seungjae,Kang Brent Byunghoon
Funder
Office of Naval Research
Institute for Information and Communications Technology Promotion
National Research Foundation of Korea
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference45 articles.
1. M.F. Ab Razak, N.B. Anuar, R. Salleh, A. Firdaus, The rise of “malware”: Bibliometric analysis of malware study, Journal of Network and Computer Applications 75 (2016) 58–76. doi: 10.1016/j.jnca.2016.08.022.
2. A survey of network anomaly detection techniques;Ahmed;Journal of Network and Computer Applications,2016
3. Anubis, URL:http://anubis.iseclab.org/.
4. G.N. Barbosa, R.R. Branco, Prevalent characteristics in modern malware, black hat USA 2014 (2014).
5. Dynamic analysis of malicious code;Bayer;Journal in Computer Virology,2006
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献