引用本文: | 王丽娜, 谈诚, 余荣威, 尹正光. 针对数据泄漏行为的恶意软件检测[J]. 计算机研究与发展, 2017, 54(7): 1537-1548. doi: 10.7544/issn1000-1239.2017.20160436 |
Citation: | Wang Lina, Tan Cheng, Yu Rongwei, Yin Zhengguang. The Malware Detection Based on Data Breach Actions[J]. Journal of Computer Research and Development, 2017, 54(7): 1537-1548. doi: 10.7544/issn1000-1239.2017.20160436 |