Author:
Alrabaee Saed,Saleem Noman,Preda Stere,Wang Lingyu,Debbabi Mourad
Subject
Law,Medical Laboratory Technology,Computer Science Applications
Reference10 articles.
1. Malware detection through mining symbol table of Linux executables;Bai,2013
2. Modèles de classification en classes empiétantes;Brucker,2001
3. Extraction of Java program fingerprints for software authorship identification;Ding;J Syst Softw,2004
4. Source code authorship analysis for supporting the cybercrime investigation process;Frantzeskou,2004
5. Authorship analysis: identifying the author of a program;Krsul;J Comput Secur,1997
Cited by
57 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献