The Application Research of Characteristic Code Techniques in Attack and Defense
暂无分享,去创建一个
[1] Pang Li-hui. Research and Implementation of Dynamically Packing Technology for PE Files , 2008 .
[2] Wan Qing. Research on Normalization towards Instructions Reordering Metamorphism Technique , 2008 .
[3] Tang Chao-jing. Modeling on Polymorphism Computer Virus Detection , 2004 .
[4] Wang Lilin,et al. The Honeynet Security System Based on Proactive Defence , 2002 .
[5] Zhang Shujie,et al. Fuzzy Clustering Model of Information Filtering , 2002 .
[6] Zhang Xian. Intrusion Tolerance Technology——Survey and Direction , 2004 .
[7] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..