[1]
A. Rinaldi, “Implementasi Fuzzy Hashing untuk Signature Malware”, ULTIMA Computing, vol. 6, no. 1, pp. 33–38, Jun. 2014.