[1] |
YAN Q , LI Y , LI T ,et al. Insights into malware detection and prevention on mobile phones[C]// Security Technology - International Conference,Sectech 2009,Held As. DBLP, 2009: 242-249.
|
[2] |
CHANDRAMOHAN M , TAN H B K . Detection of mobile malware in the wild[J]. Computer, 2012,45(9): 65-71.
|
[3] |
SOOD S . Probabilistic SimHash Matching[J]. 2011.
|
[4] |
UDDIN M S , ROY C K , SCHNEIDER K A ,et al. On the effectiveness of SimHash for detecting near-miss clones in large scale software systems[C]// Working Conference on Reverse Engineering. IEEE, 2011: 13-22.
|
[5] |
余意, 张玉柱, 胡自健 . 基于SimHash算法的大规模文档去重技术研究[J]. 信息通信, 2015(2): 28-29.
|
[6] |
BUYRUKBILEN S , BAKIRAS S . Secure similar document detection with SimHash[M]// Secure Data Management. 2014: 61-75.
|
[7] |
MANKU G S , JAIN A , SARMA A D . Detecting near-duplicates for web crawling[C]// International Conference on World Wide Web. ACM, 2007: 141-150.
|
[8] |
周龙泉, 卫文学 . 基于主成分分析与 SimHash 的入侵检测方法[J]. 计算机与数字工程, 2015(7): 1291-1294.
|
|
ZHOU L Q , WEI W X . Intrusion detectin method based on principal component analysis and SimHash[J]. Computer and Digital Engineering, 2015(7): 1291-1294.
|
[9] |
FREUND Y , SCHAPIRE R E . large margin classification using the perceptron algorithm[J]. Machine Learning, 1999,37(3): 277-296.
|
[10] |
UDDIN M S , ROY C K , SCHNEIDER K A ,et al. On the effectiveness of SimHash for detecting near-miss clones in large scale software systems[C]// Working Conference on Reverse Engineering. IEEE, 2011: 13-22.
|