共 18 条
[1]
Baker Brenda S., 1998, P ANN C USENIX ANN T, P15
[2]
Bauer V, 2012, 2012 28TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE (ICSM), P483, DOI 10.1109/ICSM.2012.6405311
[4]
Clone detection using abstract syntax trees
[J].
INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS,
1998,
:368-377
[5]
CodeMatch: Obfuscation Won't Conceal Your Repackaged App
[J].
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2017,
:638-648
[6]
Heinemann Lars, 2011, Top Productivity through Software Reuse. Proceedings of the 12th International Conference on Software Reuse, ICSR 2011, P207, DOI 10.1007/978-3-642-21347-2_16
[7]
JOHNSON JH, 1994, INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, P120, DOI 10.1109/ICSM.1994.336783
[9]
Koschke Rainer, 2007, DAGST SEM P