A toolkit for detecting and analyzing malicious software
暂无分享,去创建一个
Michael Schatz | Michael Weber | Matthew Schmid | David Geyer | M. Schatz | Michael Weber | David Geyer | M. Schmid
[1] Daniel E. Geer,et al. Mobile Code Security , 1998, IEEE Internet Comput..
[2] Kenneth W. Regan,et al. Computability , 2022, Algorithms and Theory of Computation Handbook.
[3] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[4] Jules Desharnais,et al. Static Detection of Malicious Code in Executable Programs , 2000 .
[5] Matt Pietrek. Windows 95 System Programming Secrets , 1995 .
[6] Elaine J. Weyuker,et al. Computability, complexity, and languages , 1983 .
[7] Harold W. Thimbleby,et al. A Framework for Modelling Trojans and Computer Virus Infection , 1998, Comput. J..
[8] Fred Cohen,et al. Computational aspects of computer viruses , 1989, Comput. Secur..