相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Many Objective-Based Feature Selection Model for Anomaly Detection in Cloud Environment
Zhixia Zhang et al.
IEEE ACCESS (2020)
Monarch butterfly optimization
Gai-Ge Wang et al.
NEURAL COMPUTING & APPLICATIONS (2019)
Malicious code detection based on CNNs and multi-objective algorithm
Zhihua Cui et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)
DGCNN: A convolutional neural network over large-scale labeled graphs
Anh Viet Phan et al.
NEURAL NETWORKS (2018)
JSDES - An Automated De-Obfuscation System for Malicious JavaScript
Moataz AbdelKhalek et al.
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017) (2017)
A deep learning approach for detecting malicious JavaScript code
Yao Wang et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
From ZeuS to Zitmo: Trends in Banking Malware
Najla Etaher et al.
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 (2015)
On the adoption of anomaly detection for packed executable filtering
Xabier Ugarte-Pedrero et al.
COMPUTERS & SECURITY (2014)