{"_id":"LeHHi4YTAzJi4Xf6w","bibbaseid":"farhadi-fung-fung-charland-preda-debbabi-scalablecodeclonesearchformalwareanalysis-2015","downloads":0,"creationDate":"2016-01-08T22:33:15.107Z","title":"Scalable code clone search for malware analysis.","author_short":["Farhadi, M. R.","Fung, B. C. M.","Fung, Y. B.","Charland, P.","Preda, S.","Debbabi, M."],"year":2015,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/john m peloquin?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2016-01-04T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Farhadi"],"firstnames":["Mohammad","Reza"],"suffixes":[]},{"propositions":[],"lastnames":["Fung"],"firstnames":["Benjamin","C.","M."],"suffixes":[]},{"propositions":[],"lastnames":["Fung"],"firstnames":["Yin","Bun"],"suffixes":[]},{"propositions":[],"lastnames":["Charland"],"firstnames":["Philippe"],"suffixes":[]},{"propositions":[],"lastnames":["Preda"],"firstnames":["Stere"],"suffixes":[]},{"propositions":[],"lastnames":["Debbabi"],"firstnames":["Mourad"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/2118fbe153b5b74300168f60777f4d978/dblp","ee":"http://dx.doi.org/10.1016/j.diin.2015.06.001","interhash":"0b0e93fa2ac0eee47275496030272e3a","intrahash":"118fbe153b5b74300168f60777f4d978","journal":"Digital Investigation","keywords":"dblp","pages":"46-60","timestamp":"2016-01-05T11:40:10.000+0100","title":"Scalable code clone search for malware analysis.","url":"http://dblp.uni-trier.de/db/journals/di/di15.html#FarhadiFFCPD15","volume":"15","year":"2015","bibtex":"@article{journals/di/FarhadiFFCPD15,\n added-at = {2016-01-04T00:00:00.000+0100},\n author = {Farhadi, Mohammad Reza and Fung, Benjamin C. M. and Fung, Yin Bun and Charland, Philippe and Preda, Stere and Debbabi, Mourad},\n biburl = {http://www.bibsonomy.org/bibtex/2118fbe153b5b74300168f60777f4d978/dblp},\n ee = {http://dx.doi.org/10.1016/j.diin.2015.06.001},\n interhash = {0b0e93fa2ac0eee47275496030272e3a},\n intrahash = {118fbe153b5b74300168f60777f4d978},\n journal = {Digital Investigation},\n keywords = {dblp},\n pages = {46-60},\n timestamp = {2016-01-05T11:40:10.000+0100},\n title = {Scalable code clone search for malware analysis.},\n url = {http://dblp.uni-trier.de/db/journals/di/di15.html#FarhadiFFCPD15},\n volume = 15,\n year = 2015\n}\n\n","author_short":["Farhadi, M. R.","Fung, B. C. M.","Fung, Y. B.","Charland, P.","Preda, S.","Debbabi, M."],"key":"journals/di/FarhadiFFCPD15","id":"journals/di/FarhadiFFCPD15","bibbaseid":"farhadi-fung-fung-charland-preda-debbabi-scalablecodeclonesearchformalwareanalysis-2015","role":"author","urls":{"Link":"http://dx.doi.org/10.1016/j.diin.2015.06.001","Paper":"http://dblp.uni-trier.de/db/journals/di/di15.html#FarhadiFFCPD15"},"keyword":["dblp"],"downloads":0},"search_terms":["scalable","code","clone","search","malware","analysis","farhadi","fung","fung","charland","preda","debbabi"],"keywords":["dblp"],"authorIDs":[],"dataSources":["7iBjTDWSdK27C35dP"]}