[1]Kolter J Z, Maloof M A. Learning to detect and classify malicious executables in the wild[J]. The Journal of Machine Learning Research, 2006,7:27212744.
[2]Hu Xin, Chiueh T, Shin K G. Largescale malware indexing using functioncall graphs[C]∥Proc of the 16th ACM on Computer and Communication Security, 2009:611620.
[3]Gao Suixiang. Graph theory and network flow theory [M]. China Higher Education Press, 2009.(in Chinese)
[4]Kuhn H W. The hungarian method for the assignment problem[J]∥Naval Research Logistics Quarterly, 1955,2(12):8397.
[5]Krane D E, Raymer M L. Fundamental concepts of bioinformatics[M]. Sun Xiao, Translation. Tsinghua:Qinghua University Press, 2004.(in Chinese)
[6]Riesen K, Neuhaus M, Bunke H. Bipartite graph matching for computing the edit distance of graphs[C]∥Proc of the 6th International Conference on GraphBased Representations in Pattern Recognition IAPRTC15, 2007:112.
附中文参考文献:
[3]高随祥. 图论与网络流理论[M]. 高等教育出版社, 2009.
[5]Krane D E, Raymer M L. 生物信息学概论[M]. 孙啸,译.北京:清华大学出版社,2004.