[1] |
DU Yao.
Android Malicious Family Detection Algorithm Based on Local Optimization Matching
[J]. Computer Engineering and Applications, 2021, 57(8): 84-90.
|
[2] |
CHEN Xiaohan, WEI Shuning, QIN Zhengze.
Malware Family Classification Based on Deep Learning Visualization
[J]. Computer Engineering and Applications, 2021, 57(22): 131-138.
|
[3] |
CHEN Yaoyang, CHEN Wei.
Control Flow Obfuscation Technology Based on Implicit Jump
[J]. Computer Engineering and Applications, 2021, 57(20): 125-132.
|
[4] |
ZHONG Qidong, ZHANG Jingxiang.
Chinese Composition Scoring Algorithm Embedded with Language Deep Perception
[J]. Computer Engineering and Applications, 2020, 56(8): 124-129.
|
[5] |
JIANG Jinchuan, WANG Chong.
Research on PageRank Algorithm Based on Learning Automata and User Interest
[J]. Computer Engineering and Applications, 2020, 56(3): 80-85.
|
[6] |
WANG Guodong, LU Tianliang, YIN Haoran, ZHANG Jianlin.
Malicious Code Family Detection Technology Based on CNN-BiLSTM
[J]. Computer Engineering and Applications, 2020, 56(24): 72-77.
|
[7] |
ZHOU Yang, LU Tianliang, DU Yanhui, GUO Rui, BAO Yuxuan, LI Mo.
Detection and Analysis of Windows Malicious Code Based on Thread Fusion Feature
[J]. Computer Engineering and Applications, 2020, 56(23): 103-108.
|
[8] |
WANG Peng, Nurbol, SU Rui.
Bibliometric Analysis of Current Studies and Developing Trends on Malicious Code Research
[J]. Computer Engineering and Applications, 2019, 55(8): 92-101.
|
[9] |
HUANG Simeng1, CHENG Lianglun2, WANG Tao2.
Multi-Pattern Complex Event Detection Method Based on Double-Array Trie-Tree
[J]. Computer Engineering and Applications, 2019, 55(4): 91-95.
|
[10] |
ZHANG Sheng, LI Yuqing, LI Yuanqingzhen.
Multi-Value Cellular Automata Simulation and Application Combined with User Perception Model
[J]. Computer Engineering and Applications, 2019, 55(20): 250-256.
|
[11] |
HE Hong, CHEN Yong.
HE Hong, CHEN Yong
[J]. Computer Engineering and Applications, 2019, 55(14): 209-214.
|
[12] |
LIN Hongyang, PENG Jianshan, ZHAO Shibin, ZHU Junhu, XU Hang.
Survey on JavaScript Engine Vulnerability Detection
[J]. Computer Engineering and Applications, 2019, 55(11): 16-24.
|
[13] |
CHEN Lu, MA Yuanyuan, SHI Congcong, LI Nige, LI Weiwei.
Research on Android application security flaws static analysis technology
[J]. Computer Engineering and Applications, 2018, 54(4): 117-121.
|
[14] |
FU Zhe1,2, LI Jun2.
Survey on high performance regular expression matching algorithms
[J]. Computer Engineering and Applications, 2018, 54(20): 1-13.
|
[15] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|