A software birthmark based on weighted k-gram

被引:0
|
作者
Xie, Xin [1 ]
Liu, Fenlin [1 ]
Lu, Bin [1 ]
Chen, Lin [1 ]
机构
[1] Zhengzhou Information Science and Technology Institute, Zhengzhou, Henan, 450002, China
关键词
Compendex;
D O I
5658584
中图分类号
学科分类号
摘要
Semantics
引用
收藏
页码:400 / 405
相关论文
共 50 条
  • [41] Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model
    Xu, Xi
    Zheng, Qinghua
    Yan, Zheng
    Fan, Ming
    Jia, Ang
    Liu, Ting
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 873 - 884
  • [42] Version-Wide Software Birthmark via Machine Learning
    Chung, Chih-Ko
    Wang, Pi-Chung
    IEEE ACCESS, 2021, 9 : 110811 - 110825
  • [43] Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction
    Yokoi, Takanori
    Tamada, Haruaki
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2018, 6 (04) : 224 - 231
  • [44] Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction
    Takanori Yokoi
    Haruaki Tamada
    International Journal of Networked and Distributed Computing, 2018, 6 (4) : 224 - 231
  • [45] DKISB: Dynamic Key Instruction Sequence Birthmark for Software Plagiarism Detection
    Tian, Zhenzhou
    Zheng, Qinghua
    Liu, Ting
    Fan, Ming
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 619 - 627
  • [46] A STATIC SOFTWARE BIRTHMARK BASED ON USE-DEFINE CHAINS FOR DETECTING THE THEFT OF JAVA']JAVA PROGRAMS
    Xie, Xin
    Liu, Fenlin
    Lu, Bin
    Zhao, Tao
    Li, Hanning
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 231 - 237
  • [47] Vulnerability Prediction Based on Weighted Software Network for Secure Software Building
    Wei, Shengjun
    Zhong, Hao
    Shan, Chun
    Ye, Lin
    Du, Xiaojiang
    Guizani, Mohsen
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [48] THE RESEARCH OF SOFTWARE RELIABILITY HYBRID MODEL BASED ON WEIGHTED
    Yu, Tao
    Ding, Xiao-Ming
    2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 377 - 380
  • [49] Software Birthmark Usability for Source Code Transformation Using Machine Learning Algorithms
    Guan, Keqing
    Nazir, Shah
    Kong, Xianli
    Rehman, Sadaqat Ur
    SCIENTIFIC PROGRAMMING, 2021, 2021
  • [50] Software Birthmark Based Theft Detection of Java']JavaScript Programs Using Agglomerative Clustering and Improved Frequent Subgraph Mining
    Patel, Swati
    Pattewar, Tareek
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2014,