作者: Wenjun Hu , Jing Tao , Xiaobo Ma , Wenyu Zhou , Shuang Zhao
DOI: 10.1109/ICCCN.2014.6911805
关键词:
摘要: … We then divide the method invocation graph into sub-graphs. … method invocation graph and processing sub-graphs, we need … , we calculated each subgraph’s threat score according to …