File detection on network traffic using approximate matching, Journal of Digital Forensics, Security and Law, vol.9, issue.2, pp.23-35, 2014. ,
Performance issues about contexttriggered piecewise hashing, Proceedings of the International Conference on Digital Forensics and Cyber Crime, pp.141-155, 2011. ,
Similarity preserving hashing: Eligible properties and a new algorithm MRSH-v2, Proceedings of the International Conference on Digital Forensics and Cyber Crime, pp.167-182, 2012. ,
On the resemblance and containment of documents, Proceedings of the Conference on Compression and Complexity of Sequences, pp.21-29, 1997. ,
Similarity estimation techniques from rounding algorithms, Proceedings of the Thirty-Fourth Annual ACM Symposium on the Theory of Computing, pp.380-388, 2002. ,
An efficient piecewise hashing method for computer forensics, Proceedings of the First International Workshop on Knowledge Discovery and Data Mining, pp.635-638, 2008. ,
, Introduction to Algorithms, 2009.
Applying machine learning techniques for detection of malicious code in network traffic, Proceedings of the Annual Conference on Artificial Intelligence, pp.44-50, 2007. ,
, Hypertext Transfer Protocol-HTTP/1.1, RFC 2616, 1999.
Cryptanalysis of the Tillich-Zémor hash function, Journal of Cryptology, vol.24, issue.1, pp.148-156, 2011. ,
Bytewise approximate matching: The good, the bad and the unknown, Journal of Digital Forensics, Security and Law, vol.11, issue.2, pp.59-77, 2016. ,
Pre-image of Tillich-Zémor hash function with new generators, Applied Mathematical Sciences, vol.7, issue.85, pp.4237-4248, 2013. ,
Improved form of Tillich-Zémor hash function, International Journal of Theoretical Physics and Cryptography, vol.6, pp.24-29, 2014. ,
Identifying almost identical files using contexttriggered piecewise hashing, Digital Investigation, vol.3, pp.91-97, 2006. ,
, National Software Reference Library (NSRL), 2018.
TLSH-A locality sensitive hash, Proceedings of the Fourth Cybercrime and Trustworthy Computing Workshop, pp.7-13, 2013. ,
Pre-images for the Tillich-Zémor hash function, Proceedings of the International Workshop on Selected Areas in Cryptography, pp.282-301, 2010. ,
Data fingerprinting with similarity digests, Advances in Digital Forensics, pp.207-226, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01060620
An evaluation of forensic similarity hashes, Digital Investigation, vol.8, pp.34-41, 2011. ,
, defense of MinHash over SimHash, Proceedings of the Seventeenth International Conference on Artificial Intelligence and Statistics, pp.886-894, 2014.
Data leak detection as a service, Proceedings of the International Conference on Security and Privacy in Communications Systems, pp.222-240, 2012. ,
Hashing with SL 2, Proceedings of the International Cryptology Conference, pp.40-49, 1994. ,
, , 2002.
State-ofthe-art in string similarity search and join, ACM SIGMOD Record, vol.43, issue.1, pp.64-76, 2014. ,
, Wikipedia, Nilsimsa Hash (en.wikipedia.org/wiki/Nilsimsa_ Hash), 2018.
F2S2: Fast forensic similarity search through indexing piecewise hash signatures, Digital Investigation, vol.10, issue.4, pp.361-371, 2013. ,