Research Article
Application Research of File Fingerprint Identification Detection Based on a Network Security Protection System
Figure 11
Process flow corresponding to different fingerprint algorithms. (a) KbS fingerprint and PbS fingerprint processing flow chart. (b) SoP fingerprint processing flow chart.
(a) |
(b) |