[1]KEHI W,GE Yueguang,CHEN Wei.The research and imple-mentation of the linux process real-time monitoring tech-nology[C]//Proceedings of International Conference on Computational and Information Sciences.Washington D.C.,USA:IEEE
Press,2012:1046-1049.br/
[2]冯文林.虚拟环境下病毒查杀问题研究[J].计算机工程,2016,42(11):182-188.br/
[3]TOMOVSKI I,KOCAREV L.Simple algorithm for virus spreading control on complex networks[J].IEEE Transactions on Circuits and Systems I:Regular Papers,2012,59(4):763-771.br/
[4]谢瑶,潘剑峰,朱明.Linux/Unix环境中ELF格式病毒的分析[J].计算机工程,2005,31(4):166-168.br/
(下转第173页)
(上接第166页)
[5]NARAYANAN A,CHEN Yongsheng,PANG Shuping.The effects of different representations on static structure analysis of computer malware signatures[J].Scientific World Journal,2013,9(10):1155-1160.br/
[6]郭晨,梁家荣,梁美莲.基于BP神经网络的病毒检测方法[J].计算机工程,2005,31(2):152-156.br/
[7]吴俊利,张步涵,王魁.基于Adaboost的BP神经网络改进算法在短期风速预测中的应用[J].电网技术,2012,36(9):221-225.br/
[8]XU Lei,LI Yanda.Machine learning and intelligence science[J].Frontiers of Electrical and Electronic Engineering in China,2012,7(11):1-4.br/
[9]杨新武,马壮,袁顺.基于弱分类器调整的多分类Adaboost算法[J].电子与信息学报,2016,38(2): 373-380.br/
[10]李闯,丁晓青,吴佑寿.一种改进的 AdaBoost 算法——AD AdaBoost[J].计算机学报,2007,30(1):103-109.br/
[11]邱仁博,娄 震.一种改进的带参数AdaBoost算法[J].计算机工程,2016,42(7):199-202,208.br/
[12]刘明亮,甄建聚,孙来军,等.基于DS证据理论的SVM分类模糊域数据修正[J].电力自动化设备,2012,32(3):71-75.br/
[13]费翔,周健.一种处理冲突证据的D-S证据权重计算方法[J].计算机工程,2016,42(2):142-145.br/
[14]廖平,郑友娟,覃才珑.基于改进证据理论的全信息故障诊断[J].计算机工程,2016,42(3):308-311,316.br/
[15]BAYOGLU B,SOGUKPINAR I.Polymorphic worm detection using strong token-pair signatures[J].Turkish Journal of Electrical Engineering and Computer Sciences,2012,17(2):163-182.br/
[16]YERIMA S Y,SEZER S,MCWILLIAMS G.Analysis of Bayesian classification based approaches for android malware detection[J].IET Information Security,2013,8(1):25-36.br/ |