共 17 条
[1]
A Taxonomy of Software Integrity Protection Techniques
[J].
ADVANCES IN COMPUTERS, VOL 112,
2019, 112
:413-486
[2]
[Anonymous], 2010, Proceedings of the 4th International Workshop on Software Clones, DOI [10.1145/1808901.1808909, DOI 10.1145/1808901.1808909]
[3]
Basit H.A., 2011, P 5 INT WORK SOFTW C, P1, DOI [10.1145/1985404.1985406, DOI 10.1145/1985404.1985406]
[4]
Basit H. A., 2005, P EUR SOFTW ENG C AC, V30, P156, DOI DOI 10.1145/1095430.1081733
[5]
Borah Anindita, 2018, Proceedings of First International Conference on Smart System, Innovations and Computing. SSIC 2017. Smart Innovation, Systems and Technologies (SIST 79), P535, DOI 10.1007/978-981-10-5828-8_51
[6]
Deva Prakash D., 2016, INT J APPL ENG RES, V11, P5363
[7]
Enhancing Clone-and-Own with Systematic Reuse for Developing Software Variants
[J].
2014 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME),
2014,
:391-400
[8]
Fischer Stefan, ENHANCING CLONE AND
[9]
Göde N, 2011, 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), P311, DOI 10.1145/1985793.1985836
[10]
Detecting Clones in Business Applications
[J].
FIFTEENTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS,
2008,
:91-+