-
1
-
-
1142267351
-
Winnowing: Local algorithms for document fingerprinting
-
ACM Press, New York
-
Schleimer, S., Wilkerson, D., Aiken, A.: Winnowing: local algorithms for document fingerprinting. In: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp. 76-85. ACM Press, New York (2003)
-
(2003)
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.2
Aiken, A.3
-
3
-
-
1442310235
-
Finding plagiarisms among a set of programs with JPlag
-
Prechelt, L., Malpohl, G., Philippsen, M.: Finding plagiarisms among a set of programs with JPlag. Journal of Universal Computer Science 8(11), 1016-1038 (2002)
-
(2002)
Journal of Universal Computer Science
, vol.8
, Issue.11
, pp. 1016-1038
-
-
Prechelt, L.1
Malpohl, G.2
Philippsen, M.3
-
4
-
-
38349038867
-
-
SABRE BinDiff, http://www.Babre-security.com/products/bindiff.html
-
SABRE BinDiff
-
-
-
5
-
-
38349030058
-
-
Using BinDiff for Code theft detection
-
Using BinDiff for Code theft detection, http://www.sabre-security.com/ products/CodeTheft.pdf
-
-
-
-
6
-
-
38349021089
-
Dynamic Software Birthmarks to Detect the Theft of Windows Applications
-
Tamada, H., Okamoto, K., Nakamura, M., Monden, A., Matsumoto, K.: Dynamic Software Birthmarks to Detect the Theft of Windows Applications. International Symposium on Future Software Technology 20(22) (2004)
-
(2004)
International Symposium on Future Software Technology
, vol.20
, Issue.22
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.5
-
7
-
-
38349055953
-
Dynamic Software Birthmarks Based on API Calls
-
Okamoto, K., Tamada, H., Nakamura, M., Monden, A., Matsumoto, K.: Dynamic Software Birthmarks Based on API Calls. IEICE Transactions on Information and Systems 89(8), 1751-1763 (2006)
-
(2006)
IEICE Transactions on Information and Systems
, vol.89
, Issue.8
, pp. 1751-1763
-
-
Okamoto, K.1
Tamada, H.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.5
-
9
-
-
0036704573
-
-
Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. Software Engineering, IEEE Transactions on 28(8), 735-746 (2002)
-
Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. Software Engineering, IEEE Transactions on 28(8), 735-746 (2002)
-
-
-
-
11
-
-
3042819306
-
Sandmark-A tool for software protection research
-
IEEE
-
Collberg, C., Myles, G., Huntwork, A.: Sandmark-A tool for software protection research. Security & Privacy Magazine, IEEE 1(4), 40-49 (2003)
-
(2003)
Security & Privacy Magazine
, vol.1
, Issue.4
, pp. 40-49
-
-
Collberg, C.1
Myles, G.2
Huntwork, A.3
-
12
-
-
26444481301
-
Design and evaluation of birthmarks for detecting theft of java programs
-
Tamada, H., Nakamura, M., Monden, A., Matsumoto, K.: Design and evaluation of birthmarks for detecting theft of java programs. In: Proc. IASTED International Conference on Software Engineering (IASTED SE 2004), pp. 569-575 (2004)
-
(2004)
Proc. IASTED International Conference on Software Engineering (IASTED SE
, pp. 569-575
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.4
-
13
-
-
26444535682
-
Java Birthmarks-Detecting the Software Theft
-
Tamada, H., Nakamura, M., Monden, A., Matsumoto, K.: Java Birthmarks-Detecting the Software Theft-, IEICE Transactions on Information and Systems 88(9), 2148-2158 (2005)
-
(2005)
IEICE Transactions on Information and Systems
, vol.88
, Issue.9
, pp. 2148-2158
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.4
-
15
-
-
35048854764
-
Detecting software theft via whole program path birth-marks
-
Myles, G., Collberg, C.: Detecting software theft via whole program path birth-marks. Information Security Conference, 404-415 (2004)
-
(2004)
Information Security Conference
, pp. 404-415
-
-
Myles, G.1
Collberg, C.2
-
16
-
-
38349000249
-
-
Theft Detection Through Program Identification. PhD thesis, Department of Computer Science, The University of Arizona
-
MyIes, G.M.: Software Theft Detection Through Program Identification. PhD thesis, Department of Computer Science, The University of Arizona (2006)
-
(2006)
Software
-
-
MyIes, G.M.1
-
18
-
-
0032024433
-
A graph distance metric based on the maximal common subgraph
-
Bunke, H., Shearer, K.: A graph distance metric based on the maximal common subgraph. Pattern Recognition Letters 19(3-4), 255-259 (1998)
-
(1998)
Pattern Recognition Letters
, vol.19
, Issue.3-4
, pp. 255-259
-
-
Bunke, H.1
Shearer, K.2
-
20
-
-
13144282754
-
The Hungarian method for the assignment problem
-
Kuhn, H.: The Hungarian method for the assignment problem. Naval Research Logistics 52(1), 7-21 (2005)
-
(2005)
Naval Research Logistics
, vol.52
, Issue.1
, pp. 7-21
-
-
Kuhn, H.1
-
22
-
-
38349067305
-
-
Cloakware security suite, http://www.cloakware.com/products.services/ security.suite
-
Cloakware security suite
-
-
-
23
-
-
38349010094
-
-
Wang, C, A Security Architecture for Survivability Mechanisms. PhD thesis, University of Virginia
-
Wang, C.: A Security Architecture for Survivability Mechanisms. PhD thesis, University of Virginia
-
-
-
|