共 12 条
- [1] Mahmood Y., Sarwar S., Pervez Z., Et al., Method based static software birthmarks: A new approach to derogate software piracy, Proceedings of the 2nd International Conference on Computer, Control and Communication, pp. 149-155, (2009)
- [2] Xin Z., Chen H., Wang X., Et al., Replacement attacks on behavior based software birthmark, Information Security, 11, 5, pp. 1-16, (2011)
- [3] Myles G., Collberg C., K-gram based software birthmarks, Proceedings of the Symposium on Applied Computing, pp. 314-318, (2005)
- [4] Lu B., Liu F., Ge X., Et al., Feature n-gram set based software zero-watermarking, Proceedings of the International Symposiums on Information Processing, pp. 607-611, (2008)
- [5] Danicic S., Hierons R.M., Laurence M.R., On the computational complexity of dynamic slicing problems for program schemas, Mathematical Structures in Computer Science, 21, 6, pp. 1339-1362, (2011)
- [6] Liu W.-W., Shi Y., Guo Y., Et al., A malicious code detection method based on integrated bethavior characterization, Acta Electronica Sinica, 37, 4, pp. 696-700, (2009)
- [7] Tamada H., Okamoto K., Nakamura M., Et al., Dynamic software birthmarks to detect the theft of windows applications, Proceedings of the 8th International Symposium on Future Software Technology, pp. 37-43, (2004)
- [8] Proietti M., Pettorossi A., Semantics preserving transformation rules for Prolog, Proceedings of the SIGPLAN symposium on Partial Evaluation and Semantics-based Program Manipulation, pp. 274-284, (1991)
- [9] Tamada H., Nakamura M., Monden A., Et al., Design and evaluation of birthmarks for detecting theft of java programs, Proceedings of the International Conference on Software Engineering, pp. 569-575, (2004)
- [10] Bao M., Guan L.-Y., Li X.-D., Et al., A study on optimum classification character based on the distributive entropy of euclidian distance, Acta Electronica Sinica, 35, 3, pp. 469-473, (2007)