1. Cryptographic hash functions: a survey;Bakhtiari,1995
2. Network applications of bloom filters: a survey;Broder;Internet Math,2004
3. On the resemblance and containment of documents;Broder,1997
4. A survey on internet traffic identification;Callado;Commun Surv Tutor IEEE,2009
5. Effective whitelisting for filesystem forensics;Chawathe,2009