咨询与建议

限定检索结果

文献类型

  • 1 篇 会议

馆藏范围

  • 1 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 控制科学与工程
    • 1 篇 计算机科学与技术...

主题

  • 1 篇 abstract syntax ...
  • 1 篇 malicious code u...
  • 1 篇 f1-score

机构

  • 1 篇 north china elec...

作者

  • 1 篇 si guanlin
  • 1 篇 li min
  • 1 篇 jing sen
  • 1 篇 zhang yue

语言

  • 1 篇 英文
检索条件"主题词=malicious code utilization chain detection"
1 条 记 录,以下是1-10 订阅
排序:
malicious code utilization chain detection Scheme based on Abstract Syntax Tree  6
Malicious Code Utilization Chain Detection Scheme based on A...
收藏 引用
6th IEEE Advanced Information Technology, Electronic and Automation Control Conference (IEEE IAEAC)
作者: Si, Guanlin Zhang, Yue Li, Min Jing, Sen North China Elect Power Res Inst Co Ltd Beijing 100045 Peoples R China
The vulnerability based on deserialization is a code defect that does great harm but is not easy to be detected by the machine. This vulnerability requires a combination of multiple trigger functions. Once a complete ... 详细信息
来源: 评论