Evaluation of Network Traffic Analysis Using Approximate Matching Algorithms
暂无分享,去创建一个
[1] Davide Balzarotti,et al. Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis , 2018, CODASPY.
[2] Ibrahim M. Baggili,et al. Bytewise Approximate Matching: The Good, The Bad, and The Unknown , 2016, J. Digit. Forensics Secur. Law.
[3] Kaloyan Petrov,et al. Reducing the Time Required for Hashing Operations , 2013, IFIP Int. Conf. Digital Forensics.
[4] Vikas Gupta,et al. How Cuckoo Filter Can Improve Existing Approximate Matching Techniques , 2015, ICDF2C.
[5] Harald Baier,et al. Towards a Process Model for Hash Functions in Digital Forensics , 2013, ICDF2C.
[6] Jonathan Oliver,et al. TLSH -- A Locality Sensitive Hash , 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop.
[7] Christoph Busch,et al. mvHash-B - A New Approach for Similarity Preserving Hashing , 2013, 2013 Seventh International Conference on IT Security Incident Management and IT Forensics.
[8] Donghoon Chang,et al. FbHash: A New Similarity Hashing Scheme for Digital Forensics , 2019, Digit. Investig..
[9] Bin Fan,et al. Cuckoo Filter: Practically Better Than Bloom , 2014, CoNEXT.
[10] Harald Baier,et al. Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2 , 2012, ICDF2C.
[11] Mehmet Hadi Gunes,et al. IoT Traffic Flow Identification using Locality Sensitive Hashes , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).
[12] Harald Baier,et al. A Fuzzy Hashing Approach Based on Random Sequences and Hamming Distance , 2012 .
[13] Golden G. Richard,et al. Multi-resolution similarity hashing , 2007, Digit. Investig..
[14] Ibrahim M. Baggili,et al. File Detection On Network Traffic Using Approximate Matching , 2014, J. Digit. Forensics Secur. Law.
[15] Harald Baier,et al. Security Aspects of Piecewise Hashing in Computer Forensics , 2011, 2011 Sixth International Conference on IT Security Incident Management and IT Forensics.
[16] Vassil Roussev. Building a Better Similarity Trap with Statistically Improbable Features , 2009 .
[17] Ernesto Damiani,et al. An Open Digest-based Technique for Spam Detection , 2004, PDCS.
[18] Donghoon Chang,et al. Security Analysis of mvHash-B Similarity Hashing , 2016, J. Digit. Forensics Secur. Law.
[19] Víctor Gayoso Martínez,et al. An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes , 2020, Mathematics.
[20] Alex D. Breslow,et al. Morton filters: fast, compressed sparse cuckoo filters , 2019, The VLDB Journal.
[21] Thomas Mueller Graf,et al. Xor Filters , 2019, ACM J. Exp. Algorithmics.
[22] Simson L. Garfinkel,et al. Bringing science to digital forensics with standardized forensic corpora , 2009, Digit. Investig..
[23] Frank Breitinger,et al. Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees , 2017, ICDF2C.
[24] Vassil Roussev,et al. Approximate Matching: Definition and Terminology , 2014 .
[25] Vassil Roussev,et al. An evaluation of forensic similarity hashes , 2011, Digit. Investig..
[26] Travis Atkison,et al. A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions , 2017, ACM Southeast Regional Conference.
[27] Vallipuram Muthukkumarasamy,et al. A survey on data leakage prevention systems , 2016, J. Netw. Comput. Appl..
[28] Vassil Roussev,et al. Data Fingerprinting with Similarity Digests , 2010, IFIP Int. Conf. Digital Forensics.
[29] Jesse D. Kornblum. Identifying almost identical files using context triggered piecewise hashing , 2006, Digit. Investig..