Subject
Law,General Computer Science
Reference86 articles.
1. Profiling and classifying the behavior of malicious codes;Alazab;J. Syst. Softw.,2015
2. Detecting crypto-ransomware in IOT networks based on energy consumption footprint;Azmoodeh;J. Ambient Intell. Humaniz. Comput.,2018
3. Scalable, behavior-based malware clustering;Bayer;16th Symp. Netw. Distrib. Syst. Secur.,2009
4. N. Bhodia, P. Prajapati, F. Di Troia, and M. Stamp, “Transfer learning for image-based malware classification,” 2018.
5. McAfee labs threats report: April 2017;Beek;McAfee Labs Rep.,2017
Cited by
253 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献