共 21 条
[3]
Buehrer G., 2005, P 5 INT WORKSH SOFTW, P106, DOI DOI 10.1145/1108473.1108496
[4]
CLARKE J., 2012, SQL INJECTION ATTACK
[5]
Coit CJ, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P367, DOI 10.1109/DISCEX.2001.932231
[6]
Dahse J., 2010, EXPLOITING HARD FILT, V03
[7]
On the evolution of clusters of near-duplicate web pages
[J].
FIRST LATIN AMERICAN WEB CONGRESS, PROCEEDINGS,
2003,
:37-45
[8]
Fisk M., 2002, LOS ALAMOS NATL LAB
[9]
Fisk M., 2002, CS20010670 U CAL
[10]
Huang Qiang, 2011, Journal of Software, V22, P2036, DOI 10.3724/SP.J.1001.2011.03874