共 37 条
[1]
Large-Scale and Language-Oblivious Code Authorship Identification
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:101-114
[2]
Source Code Authorship Attribution Using Long Short-Term Memory Based Networks
[J].
COMPUTER SECURITY - ESORICS 2017, PT I,
2018, 10492
:65-82
[3]
Anckaert B, 2007, QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, P15
[4]
[Anonymous], 2007, International Journal of Digital Evidence
[6]
Buintsev D.N., 2015, INFORM SECUR IS, V3, P38
[7]
Burrows S, 2009, LECT NOTES COMPUT SC, V5463, P699, DOI 10.1007/978-3-642-00887-0_61
[8]
Caliskan-Islam A., 2017, ARXIV170105681
[9]
Caliskan-Islam A, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P255
[10]
The Effectiveness of Source Code Obfuscation: an Experimental Assessment
[J].
ICPC: 2009 IEEE 17TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION,
2009,
:178-+