[1] |
DU Yao.
Android Malicious Family Detection Algorithm Based on Local Optimization Matching
[J]. Computer Engineering and Applications, 2021, 57(8): 84-90.
|
[2] |
CHEN Xiaohan, WEI Shuning, QIN Zhengze.
Malware Family Classification Based on Deep Learning Visualization
[J]. Computer Engineering and Applications, 2021, 57(22): 131-138.
|
[3] |
WANG Guodong, LU Tianliang, YIN Haoran, ZHANG Jianlin.
Malicious Code Family Detection Technology Based on CNN-BiLSTM
[J]. Computer Engineering and Applications, 2020, 56(24): 72-77.
|
[4] |
ZHOU Yang, LU Tianliang, DU Yanhui, GUO Rui, BAO Yuxuan, LI Mo.
Detection and Analysis of Windows Malicious Code Based on Thread Fusion Feature
[J]. Computer Engineering and Applications, 2020, 56(23): 103-108.
|
[5] |
WANG Peng, Nurbol, SU Rui.
Bibliometric Analysis of Current Studies and Developing Trends on Malicious Code Research
[J]. Computer Engineering and Applications, 2019, 55(8): 92-101.
|
[6] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[7] |
CHEN Yu, WANG Yadi, WANG Jindong, LI Tao.
Study of influence on information security risks by delays of security measures
[J]. Computer Engineering and Applications, 2017, 53(19): 118-123.
|
[8] |
CHEN Qi1, JIANG Guoping2, XIA Lingling3.
Homology analysis of malware based on function structure
[J]. Computer Engineering and Applications, 2017, 53(14): 93-98.
|
[9] |
ZHOU Wei1, XIE Wenbin2, LI Lei3.
A kind of Cyberspace security framework design and risk assessment method
[J]. Computer Engineering and Applications, 2016, 52(18): 122-126.
|
[10] |
QIAN Yucun, PENG Guojun, WANG Ying, LIANG Yu.
Homology analysis of malicious code and family clustering
[J]. Computer Engineering and Applications, 2015, 51(18): 76-81.
|
[11] |
SHANG Jing, XU Kaiyong, YANG Qichao.
Trusted boot for computer centralized control system-oriented architecture
[J]. Computer Engineering and Applications, 2015, 51(17): 64-69.
|
[12] |
CHENG Ke, SONG Haisheng, AN Zhanfu, KONG Yongsheng.
Method for evaluation of network security risk based on t-SVR with parameters optimization by GA
[J]. Computer Engineering and Applications, 2014, 50(12): 91-95.
|
[13] |
ZHANG Shuang, KONG Deqi, LI Xiaodong.
Security risk assessment methodology for airborne system
[J]. Computer Engineering and Applications, 2013, 49(16): 232-235.
|
[14] |
CHEN Yu-feng1,2,XIANG Zheng-tao1,JIANG Wei-rong1,JIAN Wei1.
Security risk analysis framework based on network environment attributes
[J]. Computer Engineering and Applications, 2010, 46(34): 85-88.
|
[15] |
LI Zhi-yong1,XUE Liang2,TAO Ran1,ZHANG Hao1.
Mechanism and prevention of cross-domain Web page malicious code
[J]. Computer Engineering and Applications, 2010, 46(21): 135-137.
|