A software birthmark based on weighted k-gram

被引:0
|
作者
Xie, Xin [1 ]
Liu, Fenlin [1 ]
Lu, Bin [1 ]
Chen, Lin [1 ]
机构
[1] Zhengzhou Information Science and Technology Institute, Zhengzhou, Henan, 450002, China
关键词
Compendex;
D O I
5658584
中图分类号
学科分类号
摘要
Semantics
引用
收藏
页码:400 / 405
相关论文
共 50 条
  • [21] Open Source Software Detection Using Function Parameter Based Software Birthmark
    Kim, Dongjin
    Cho, Seong-je
    Park, Minkyu
    Han, Sangchul
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 801 - 811
  • [22] Birthmark based identification of software piracy using Haar wavelet
    Nazir, Shah
    Shahzad, Sara
    Wirza, Rahmita
    Amin, Rohul
    Ahsan, Muhammad
    Mukhtar, Neelam
    Garcia-Magarino, Ivan
    Lloret, Jaime
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2019, 166 : 144 - 154
  • [23] Birthmark-Based Software Classification Using Rough Sets
    Shah Nazir
    Sara Shahzad
    Lala Septem Riza
    Arabian Journal for Science and Engineering, 2017, 42 : 859 - 871
  • [24] Abstract interpretation-based semantic framework for software birthmark
    Zeng, Ying
    Liu, FenLin
    Luo, XiangYang
    Lian, ShiGuo
    COMPUTERS & SECURITY, 2012, 31 (04) : 377 - 390
  • [25] CHI Based Instruction-words Software Birthmark Selection
    Wang, Yong
    Liu, Fenlin
    Gong, Daofu
    Lu, Bin
    Ma, Shixin
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 892 - 895
  • [26] Birthmark-Based Software Classification Using Rough Sets
    Nazir, Shah
    Shahzad, Sara
    Riza, Lala Septem
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) : 859 - 871
  • [27] A software birthmark based on system call and program data dependence
    Liu, Kaige
    Zheng, Tao
    Wei, Linxi
    2014 11TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA), 2014, : 105 - 108
  • [28] Replacement attacks: automatically evading behavior-based software birthmark
    Xin, Zhi
    Chen, Huiyu
    Wang, Xinche
    Liu, Peng
    Zhu, Sencun
    Mao, Bing
    Xie, Li
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (05) : 293 - 304
  • [29] Replacement attacks: automatically evading behavior-based software birthmark
    Zhi Xin
    Huiyu Chen
    Xinche Wang
    Peng Liu
    Sencun Zhu
    Bing Mao
    Li Xie
    International Journal of Information Security, 2012, 11 : 293 - 304
  • [30] kDeepBind: Prediction of RNA-Proteins binding sites using convolution neural network and k-gram features
    Tahir, Muhammad
    Tayara, Hilal
    Hayat, Maqsood
    Chong, Kil To
    CHEMOMETRICS AND INTELLIGENT LABORATORY SYSTEMS, 2021, 208