|
|
|
|
LEADER |
02872nam a22004935i 4500 |
001 |
978-1-4471-2909-7 |
003 |
DE-He213 |
005 |
20151031111101.0 |
007 |
cr nn 008mamaa |
008 |
120302s2012 xxk| s |||| 0|eng d |
020 |
|
|
|a 9781447129097
|9 978-1-4471-2909-7
|
024 |
7 |
|
|a 10.1007/978-1-4471-2909-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Cesare, Silvio.
|e author.
|
245 |
1 |
0 |
|a Software Similarity and Classification
|h [electronic resource] /
|c by Silvio Cesare, Yang Xiang.
|
264 |
|
1 |
|a London :
|b Springer London,
|c 2012.
|
300 |
|
|
|a XIV, 88 p. 26 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Computer Science,
|x 2191-5768
|
505 |
0 |
|
|a Preface -- Acknowledgements -- Introduction -- Taxonomy of Program Features -- Program Transformations and Obfuscations -- Formal Methods of Program Analysis -- Static Analysis of Binaries -- Dynamic Analysis -- Feature Extraction -- Software Birthmark Similarity -- Software Similarity Searching and Classification -- Applications -- Future Trends and Conclusion.
|
520 |
|
|
|a Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
700 |
1 |
|
|a Xiang, Yang.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9781447129080
|
830 |
|
0 |
|a SpringerBriefs in Computer Science,
|x 2191-5768
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-1-4471-2909-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|