共 13 条
- [1] Pavlenko E.Yu.(2017)Hierarchical approach to analyzing security breaches in information systems Autom. Control Comput. Sci. 51 829-834
- [2] Yarmak A.V.(2018)Studying the effect of selection of the sign and ratio in the formation of a signature in a program identification problem Autom. Control Comput. Sci. 52 1101-1104
- [3] Moskvin D.A.(2018)Gradient boosting trees method in the task of software identification, Mekh. Opt. 18 1016-1022
- [4] Salakhutdinova K.I.(2015)Decision tree’s features of application in classification problems, Radioelektron. 15 26-32
- [5] Lebedev I.S.(2006)Identifying almost identical files using context triggered piecewise hashing Digital Invest. 3 91-97
- [6] Krivtsova I.E.(undefined)undefined undefined undefined undefined-undefined
- [7] Sukhoparov M.E.(undefined)undefined undefined undefined undefined-undefined
- [8] Salakhutdinova K.I.(undefined)undefined undefined undefined undefined-undefined
- [9] Lebedev I.S.(undefined)undefined undefined undefined undefined-undefined
- [10] Krivtsova I.E.(undefined)undefined undefined undefined undefined-undefined