共 26 条
[1]
[Anonymous], LOCALITY SENSITIVE H
[2]
Bayer Ulrich, 2009, 16 ANN NETW DISTR SY
[3]
Botocan OB, 2017, INT C INTELL COMP CO, P5, DOI 10.1109/ICCP.2017.8116976
[4]
Quantifying the Effectiveness of Software Diversity using Near-Duplicate Detection Algorithms
[J].
PROCEEDINGS OF THE 5TH ACM WORKSHOP ON MOVING TARGET DEFENSE (MTD'18),
2018,
:1-10
[5]
Dell'Amico M, 2019, Arxiv, DOI arXiv:1910.07283
[6]
Ester M., 1996, P 2 INT C KNOWL DISC, P226, DOI DOI 10.5555/3001460.3001507
[7]
Performance Evaluation of Features and Clustering Algorithms for Malware
[J].
2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW),
2018,
:13-22
[8]
Hu Xin, 2013, 2013 USENIX ANN TECH
[9]
Jang JY, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P309
[10]
Li Y., 2015, 8 WORKSH CYB SEC EXP