共 12 条
[1]
[Anonymous], 2011, P 2 INT WORKSH WEB 2, DOI [10.1145/1984701.1984707, DOI 10.1145/1984701.1984707]
[2]
Arafin Md Tanvir, 2013, VULNERABILITY EXPLOI
[3]
Bird Christian, 2006, P INT WORK C MIN SOF, P137
[4]
Cui Biru, 2013, Social Computing, Behavioral-Cultural Modeling and Prediction. 6th International Conference, SBP 2013. Proceedings, P394, DOI 10.1007/978-3-642-37210-0_43
[5]
Jiang Feng, 2013, ARXIV13107469
[6]
Macqueen J., 1967, P 5 BERKELEY S MATH, VVolume 233, P281, DOI DOI 10.1007/S11665-016-2173-6
[7]
Rajput D. S, 2012, INT J COMPUT COMMUN, P2231
[8]
Sureka A, 2011, P IND SOFTW ENG C IS, P195
[9]
Surian D., 2010, Proceedings 17th Working Conference on Reverse Engineering (WCRE 2010), P269, DOI 10.1109/WCRE.2010.38