I.V FOYDALANILGAN ADABIYOTLAR
1. ↑ „Defining Malware: FAQ“. technet.microsoft.com. Qaraldi: 10-sentabr
2009-yil.
2. ↑ „An Undirected Attack Against Critical Infrastructure“. United States
Computer Emergency Readiness Team(Us-cert.gov). Qaraldi: 28-sentabr
2014-yil.
3. ↑ Cani, Andrea; Gaudesi, Marco; Sanchez, Ernesto; Squillero, Giovanni;
Tonda, Alberto (2014-03-24). „Towards automated malware creation: code
generation and code integration“. Proceedings of the 29th Annual ACM
Symposium on Applied Computing. SAC '14. New York, NY, USA:
Association
for
Computing
Machinery.
157–160-
bet. doi:10.1145/2554850.2555157. ISBN 978-1-4503-2469-4.
4. ↑ Brewer, Ross (2016-09-01). „Ransomware attacks: detection, prevention
and
cure“. Network
Security (inglizcha).
2016-jild,
№ 9.
5–9-
bet. doi:10.1016/S1353-4858(16)30086-1. ISSN 1353-4858.
5. ↑ Klein, Tobias . A Bug Hunter's Diary: A Guided Tour Through the Wilds of
Software Security (en). No Starch Press, 2011-10-11. ISBN 978-1-59327-
415-3.
6. ↑ Kim, Jin-Young; Bu, Seok-Jun; Cho, Sung-Bae (2018-09-01). „Zero-day
malware detection using transferred generative adversarial networks based
on deep autoencoders“. Information Sciences (inglizcha). 460–461-jild. 83–
102-bet. doi:10.1016/j.ins.2018.04.092. ISSN 0020-0255.
7. ↑ Razak, Mohd Faizal Ab; Anuar, Nor Badrul; Salleh, Rosli; Firdaus, Ahmad
(2016-11-01). „The rise of "malware": Bibliometric analysis of malware
study“. Journal of Network and Computer Applications (inglizcha). 75-jild.
58–76-bet. doi:10.1016/j.jnca.2016.08.022.
Do'stlaringiz bilan baham: |