[1]FARRELL S.API keys to the kingdom[J].IEEE Internet Computing,2009,13(5):91-93.
[2]VIENNOT N,GARCIA E,NIEH J.A measurement study of google play[C]//Proceedings of ACM International Conference on Measurement & Modeling of Computer Systems.New York,USA:ACM Press,2014:221-233.
[3]Techspot.10 000 AWS secret access keys carelessly left in code up-loaded to GitHub[EB/OL].[2017-07-31].http://www.techspot.com/news/56127-10000-aws-secret-access-keys-carelessly-left-in-code-uploaded-to-github.html.
[4]We reverse engineered 16k apps,here’s what we found[EB/OL].[2017-07-31].https://hackernoon.com/we-reverse-engineered-16k-apps-heres-what-we-found-51bdf3b456bb.
[5]“Truffle Hog” tool detects secret key leaks on GitHub[EB/OL].[2017-07-31].http://www.security week.com/truffle-hog-tool-detects-secret-key-leaks-github.
[6]SINHA V S,SAHA D,DHOOLIA P,et al.Detecting and mitigating secret-key leaks in source code repositories[C]//Proceedings of the 12th Working Conference on Mining Software Repositories.Washington D.C.,USA:IEEE Press,2015:396-400.
[7]刘浩广,蔡绍洪.信息熵及其随机性[J].贵州大学学报(自然科学版),2007,24(4):350-351.
(下转第129页)
(上接第121页)
[8]Scanning data for entropy anomalies[EB/OL].[2017-07-31].http://blog.dkbza.org/2007/05/scanning-data-for-entropy-anomalies.html.
[9]PENG F,SCHUURMANS D.Combining naive Bayes and n-gram language models for text classification[C]//Proceedings of European Conference on Information Retrieval.Berlin,Germany:Springer,2003:335-350.
[10]NORVIG P.Natural language corpus data[EB/OL].[2017-07-31].http://www.norvig.com/ngrams/ch14.pdf.
[11]WANG Wei,SHIRLEY K.Breaking bad:detecting malicious domains using word segmentation[EB/OL].[2017-07-31].https://arxiv.org/abs/1506.04111 2015.
[12]邓爱萍.程序代码相似度度量算法研究[J].计算机工程与设计,2008,29(17):4636-4638.
[13]石野,黄龙和,车天阳,等.基于语法树的程序相似度判定方法[J].吉林大学学报(信息科学版),2014,32(1):95-100.
[14]COMANICIU D,MEER P.Mean shift:a robust approach toward feature space analysis[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2012,24(5):603-619.
[15]张华伟,王明文,甘丽新.基于随机森林的文本分类模型研究[J].山东大学学报(理学版),2006,41(3):139-143.
[16]张希翔,赵欢.基于随机森林的语音人格预测方法[J].计算机工程,2017,43(6):253-258.
[17]KOHAVI R.A study of cross-validation and bootstrap for accuracy estimation and model selection[C]//Proceedings of International Joint Conference on Artificial Intelligence.New York,USA:ACM Press,1995:1137-1145.
[18]GOUTTE C,GAUSSIER E.A probabilistic interpretation of precision,recall and F-score,with implication for evalua-tion[C]//Proceedings of European Conference on Infor-mation Retrieval.Berlin,Germany:Springer,2005:345-359.
|