How to Automatically Identify the Homology of Different Malware | IEEE Conference Publication | IEEE Xplore