参考文献
[1]Tamada H,Nakamura M,Monden A,et al.Java Birthmarks-detecting the Software Theft[J].IEICE Transactions on Information and Systems,2005,E88-D(1):2148-2158.
[2]Ginger M,Christian S C.K-gram Based Software Birth-marks[C]//Proceedings of ACM Symposium on Applied Computing.Santa Fe,USA:ACM Press,2005:314-318.
[3]邓小鸿,拜亚萌,黄斌,等.一种可检测Java程序盗版的动态胎记技术[J].计算机工程与应用,2010,46(17):69-71,84.
[4]陈林,刘粉林,芦斌,等.基于k-gram频数的静态软件胎记[J].计算机工程,2011,37(4):46-48.
[5]Liu Fenlin,Lu Bin,Chen Lin.A Software Birthmark Based on Weighted k-gram[C]//Proceedings of 2010 Conference on Intelligent Computing and Intelligent Systems.Washington D.C.,USA:IEEE Press,2010:400-405.
[6]马世鑫,刘粉林,罗向阳,等.基于互信息的k-gram软件胎记选取[J].计算机工程,2012,38(22):43-46.
[7]罗养霞,房鼎益.基于聚类分析的软件胎记特征选择[J].电子学报,2013,41(12):2334-2338.
[8]李菲菲,周清雷.基于信息增益的软件特征技术[J].计算机应用研究,2014,31(7):2082-2084,2087.
[9]Myles G,Collberg C.Detecting Software Theft via Whole Program Path Birthmarks[C]//Proceedings of the 7th International Conference on Information Security.Washington D.C.,USA:IEEE Press,2004:404-415.
[10]Tamada H,Okamoto K,Nakam M,et al.Dynamic Software Birthmarks to Detect the Theft of Windows Appli-cations[C]//Proceedings of International Symposium on Future Software Technology.Washington D.C.,USA:IEEE Press,2004:125-136.
[11]孙光,樊晓平,刘钟理.扩展频繁执行路径上的n-gram软件胎记[J].信息网络安全,2013(2):57-60.
[12]韩兰胜,高昆仑,赵保华,等.基于API函数及其参数相结合的恶意软件行为检测[J].计算机应用研究,2013,30(11):3407-3410,3425.
[13]范铭,刘均,郑庆华,等.基于栈行为动态胎记的软件抄袭检测方法[J].山东大学学报:理学版,2014:9-16.
[14]Lim H,Park H,Choi S,et al.Detecting Theft of Java Applications via a Static Birthmark Based on Weighted Stack Patterns[J].IEICE Transactions on Information and Systems,2008,E91-D(9):2323-2339.
[15]Lim H,Park H,Choi S,et al.A Method for Detecting the Theft of Java Programs Through Analysis of the Control Flow Information[J].Information and Software Technology,2009,51(9):1338-1350.
[16]周清雷,张凤萍.基于程序数据属性的联合软件特征[J].计算机应用与软件,2014,31(4):308-311.
编辑索书志 |