共 7 条
[1]
IOPI, BORR MICR COD SIGN C
[2]
Krebs B., 2013, Security Firm Bit9 Hacked, Used to Spread Malware
[3]
Leskovec J., 2010, Mining of Massive Datasets
[4]
Ni Y., 2017, DETECTING ABUSE SCAL
[5]
Oliver J., SMART WHITELISTING U
[6]
Oliver J, 2014, COMM COM INF SC, V490, P199
[7]
TLSH - A Locality Sensitive Hash
[J].
2013 FOURTH CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2013),
2014,
:7-13