Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 467-470.doi: 10.11896/j.issn.1002-137X.2016.6A.110
Previous Articles Next Articles
HUANG Shou-meng, GAO Hua-ling and PAN Yu-xia
[1] Collberg C,Nagra J.软件加密与解密[M].崔孝晨,译.北京:人民邮电出版社,2012 [2] Broder A Z.On the resemblance and containment of documents[C]∥Compression and Complexity of Sequences(SEQUENCES’97).IEEE,1997:21-29 [3] Bunke H,Shearer K.A graph distance metric based on the maxi-mal common subgraph[J].Pattern Recognition Letters,1998,9:255-259 [4] Aiken A.Moss—a system for detecting software plagiarism[EB/OL].(2011-04-29)[2014-01-15].www.cs.berkeley.edu/~aiken/moss.html [5] Aiken A,Schleimer S,Auslander J,et al.Method and apparatus for indexing document content and content comparison with world wide web search service[P].U.S.Assigned to the Regents of the University of California,2004,6:6757675 [6] Schleimer S,Wilkerson D,Aiken A.Winnowing:Local algo-rithms for document fingerprinting[C]∥Proceedings of the 2003 SIGMOD Conference.2003 [7] Tamada H,Nakamura M,Monden A,et al.Detecting the theft of Programs using birthmarks[J].Nara Institute of Science and Technology,2003 [8] Tamada H,Nakamura M,Monden A,et al.Design and evaluation of birthmarks for detecting theft of Java programs[C]∥IASTED International Conference on Software Engineering.2004:569-575 [9] Tamada H,Okamoto K,Nakamura M,et al.Dynamic software birthmarking to detect the theft of windows applications[C]∥Proceedings of the international Symposium on Future software Technology.2004 [10] Schuler D,Dallmeier V.Detecting software theft with API call sequence sets[C]∥Proceedings of the 8th Workshop Software Reengineering.2006 [11] Schuler D,Dallmeier V,Lindig C.A dynamic birthmark for Java[C]∥22nd IEEE/ACM International Conference on Automated Software Engineering.2007 [12] Ertl M A.Stack caching for interpreters[J].SIGPLAN Not.,1995,30(6):315-327 [13] Komondoor R,Horwitz S.Using slicing to identify duplication in source code[C]∥Proceedings of the 8th International Sympo-sium on Static Analysis.2001:40-56 [14] Liu Chao,Chen Chen,Han Jia-wei,et al.Gplag:detection of software plagiarism by program dependence graph analysis[C]∥KDD’06.ACM,2006:872-881 [15] Myles G.Software Theft Detection Through Program Identification[M].University of Arizona,2006 [16] Myles G,Collberg C.Detecting software theft via whole program path birthmarks[C]∥7th International Conference Information Security.2004 [17] Kontogiannis K.Evaluation experiments on the detection of programming patterns using software metrics[C]∥Working Confe-rence on reverse Engineering.1997:1-44 [18] Krsul I,Spafford E.Authorship analysis:Identifying the author of a program: CSD-TR-94-030[R].Computer Science Deparment,Purdue University,1994 |
No related articles found! |
|