F. Breitinger and I. Baggili, File detection on network traffic using approximate matching, Journal of Digital Forensics, Security and Law, vol.9, issue.2, pp.23-35, 2014.

F. Breitinger and H. Baier, Performance issues about contexttriggered piecewise hashing, Proceedings of the International Conference on Digital Forensics and Cyber Crime, pp.141-155, 2011.

F. Breitinger and H. Baier, Similarity preserving hashing: Eligible properties and a new algorithm MRSH-v2, Proceedings of the International Conference on Digital Forensics and Cyber Crime, pp.167-182, 2012.

A. Broder, On the resemblance and containment of documents, Proceedings of the Conference on Compression and Complexity of Sequences, pp.21-29, 1997.

M. Charikar, Similarity estimation techniques from rounding algorithms, Proceedings of the Thirty-Fourth Annual ACM Symposium on the Theory of Computing, pp.380-388, 2002.

L. Chen and G. Wang, An efficient piecewise hashing method for computer forensics, Proceedings of the First International Workshop on Knowledge Discovery and Data Mining, pp.635-638, 2008.

T. Cormen, C. Leiserson, R. Rivest, and C. Stein, Introduction to Algorithms, 2009.

Y. Elovici, A. Shabtai, R. Moskovitch, G. Tahan, and C. Glezer, Applying machine learning techniques for detection of malicious code in network traffic, Proceedings of the Annual Conference on Artificial Intelligence, pp.44-50, 2007.

R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter et al., Hypertext Transfer Protocol-HTTP/1.1, RFC 2616, 1999.

M. Grassl, I. Ilic, S. Magliveras, and R. Steinwandt, Cryptanalysis of the Tillich-Zémor hash function, Journal of Cryptology, vol.24, issue.1, pp.148-156, 2011.

V. Harichandran, F. Breitinger, and I. Baggili, Bytewise approximate matching: The good, the bad and the unknown, Journal of Digital Forensics, Security and Law, vol.11, issue.2, pp.59-77, 2016.

K. Joju and P. Lilly, Pre-image of Tillich-Zémor hash function with new generators, Applied Mathematical Sciences, vol.7, issue.85, pp.4237-4248, 2013.

K. Joju and P. Lilly, Improved form of Tillich-Zémor hash function, International Journal of Theoretical Physics and Cryptography, vol.6, pp.24-29, 2014.

J. Kornblum, Identifying almost identical files using contexttriggered piecewise hashing, Digital Investigation, vol.3, pp.91-97, 2006.

, National Software Reference Library (NSRL), 2018.

J. Oliver, C. Cheng, and Y. Chen, TLSH-A locality sensitive hash, Proceedings of the Fourth Cybercrime and Trustworthy Computing Workshop, pp.7-13, 2013.

C. Petit and J. Quisquater, Pre-images for the Tillich-Zémor hash function, Proceedings of the International Workshop on Selected Areas in Cryptography, pp.282-301, 2010.

V. Roussev, Data fingerprinting with similarity digests, Advances in Digital Forensics, pp.207-226, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01060620

V. Roussev, An evaluation of forensic similarity hashes, Digital Investigation, vol.8, pp.34-41, 2011.

A. Shrivastava and P. Li, defense of MinHash over SimHash, Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, pp.886-894, 2014.

X. Shu and D. Yao, Data leak detection as a service, Proceedings of the International Conference on Security and Privacy in Communications Systems, pp.222-240, 2012.

J. Tillich and G. Zémor, Hashing with SL 2, Proceedings of the International Cryptology Conference, pp.40-49, 1994.

A. , , 2002.

S. Wandelt, J. Wang, S. Gerdjikov, S. Mishra, P. Mitankin et al., State-ofthe-art in string similarity search and join, ACM SIGMOD Record, vol.43, issue.1, pp.64-76, 2014.

, Wikipedia, Nilsimsa Hash (en.wikipedia.org/wiki/Nilsimsa_ Hash), 2018.

C. Winter, M. Schneider, and Y. Yannikos, F2S2: Fast forensic similarity search through indexing piecewise hash signatures, Digital Investigation, vol.10, issue.4, pp.361-371, 2013.