Malicious Behavior Patterns
暂无分享,去创建一个
[1] Mary Lynn Garcia,et al. The Design and Evaluation of Physical Protection Systems , 2001 .
[2] Eric Filiol,et al. Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language , 2009, RAID.
[3] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[4] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[5] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[6] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[7] Kurt M. Bischoff. Ox: An Attribute-Grammar Compiling System based on Yacc, Lex, and C: User Reference Manual , 1993 .