共 49 条
[41]
Who Wrote This Code? Identifying the Authors of Program Binaries
[J].
COMPUTER SECURITY - ESORICS 2011,
2011, 6879
:172-189
[42]
Shin ECR, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P611
[43]
Spafford E. H., 1993, Computers & Security, V12, P585, DOI 10.1016/0167-4048(93)90055-A
[44]
Srivastava N, 2014, J MACH LEARN RES, V15, P1929
[45]
A Survey of Modern Authorship Attribution Methods
[J].
JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY,
2009, 60 (03)
:538-556
[46]
Stolerman Ariel, 2013, CLASSIFY VERIFY BREA, V11
[47]
Tieleman T., 2012, COURSERA: Neural Netw. Mach. Learn., V4, P2
[48]
Uzuner Ö, 2005, LECT NOTES ARTIF INT, V3651, P969, DOI 10.1007/11562214_84
[49]
Authorship - The coin of the realm, the source of complaints
[J].
JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION,
1998, 280 (03)
:216-217