[1]
A. Rinaldi, “Implementasi Fuzzy Hashing untuk Signature Malware”, Ultima Computing : Jurnal Sistem Komputer, vol. 6, no. 1, pp. 33-38, Jun. 2014.