CORC

浏览/检索结果: 共8条,第1-8条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
The research and application of trusted startup of embedded TPM 会议论文
Shenyang, China, July 27-29, 2020
作者:  Shang WL(尚文利);  Zhang, Xiule;  Chen, Xin;  Liu XD(刘贤达);  Chen CY(陈春雨)
收藏  |  浏览/下载:7/0  |  提交时间:2020/10/10
AppSpear: Bytecode decrypting and DEX reassembling for packed android malware 会议论文
作者:  Yang, Wenbo;  Zhang, Yuanyuan;  Li, Juanru;  Shu, Junliang;  Li, Bodong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/02
METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION 会议论文
3rd IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), PEOPLES R CHINA, 2014-11-27
作者:  Li, Wenwu;  Li, Chao;  Duan, Miyi
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/06
METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION 会议论文
2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014-01-01
作者:  Li, Wenwu;  Li, Chao;  Duan, Miyi
收藏  |  浏览/下载:11/0  |  提交时间:2020/01/06
obtaining the integrity of your virtual machine in the cloud 会议论文
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29, 2011 - December 1, 2011
Yu Aimin; Qin Yu; Wang Dan
收藏  |  浏览/下载:10/0  |  提交时间:2013/10/08
Detecting Malicious Code in Executable Programs with the Principle of Danger Theory 会议论文
作者:  Zhang, Junmin;  Liang, Yiwen
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Detecting Malicious Code in Executable Programs with the Principle of Danger Theory 会议论文
作者:  Zhang, Junmin;  Liang, Yiwen
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/05
Analyze and detect malicious code for compound document binary storage format (EI收录) 会议论文
Proceedings - International Conference on Machine Learning and Cybernetics, Guilin, Guangxi, China, July 10, 2011 - July 13, 2011
作者:  Gao, Yu-Xiang[1];  Qi, De-Yu[1]
收藏  |  浏览/下载:0/0  |  提交时间:2019/04/15


©版权所有 ©2017 CSpace - Powered by CSpace