共 12 条
- [1] [Anonymous], 2011, P 2 INT WORKSH WEB 2, DOI [10.1145/1984701.1984707, DOI 10.1145/1984701.1984707]
- [2] Arafin Md Tanvir, 2013, VULNERABILITY EXPLOI
- [3] Bird Christian, 2006, P INT WORK C MIN SOF, P137
- [4] Cui Biru, 2013, Social Computing, Behavioral-Cultural Modeling and Prediction. 6th International Conference, SBP 2013. Proceedings, P394, DOI 10.1007/978-3-642-37210-0_43
- [5] Jiang Feng, 2013, ARXIV13107469
- [6] Macqueen J., 1967, P 5 BERKELEY S MATH, VVolume 233, P281, DOI DOI 10.1007/S11665-016-2173-6
- [7] Rajput D. S, 2012, INT J COMPUT COMMUN, P2231
- [8] Sureka A, 2011, P IND SOFTW ENG C IS, P195
- [9] Surian D., 2010, Proceedings 17th Working Conference on Reverse Engineering (WCRE 2010), P269, DOI 10.1109/WCRE.2010.38