000 | 02834nam a22004815i 4500 | ||
---|---|---|---|
001 | 978-1-4471-2909-7 | ||
003 | DE-He213 | ||
005 | 20170628033631.0 | ||
007 | cr nn 008mamaa | ||
008 | 120302s2012 xxk| s |||| 0|eng d | ||
020 |
_a9781447129097 _9978-1-4471-2909-7 |
||
024 | 7 |
_a10.1007/978-1-4471-2909-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aCesare, Silvio. _eauthor. |
|
245 | 1 | 0 |
_aSoftware Similarity and Classification _h[electronic resource] / _cby Silvio Cesare, Yang Xiang. |
264 | 1 |
_aLondon : _bSpringer London, _c2012. |
|
300 |
_aXIV, 88p. 26 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
505 | 0 | _aPreface -- Acknowledgements -- Introduction -- Taxonomy of Program Features -- Program Transformations and Obfuscations -- Formal Methods of Program Analysis -- Static Analysis of Binaries -- Dynamic Analysis -- Feature Extraction -- Software Birthmark Similarity -- Software Similarity Searching and Classification -- Applications -- Future Trends and Conclusion. | |
520 | _aSoftware similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aData protection. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
700 | 1 |
_aXiang, Yang. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781447129080 |
830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4471-2909-7 |
912 | _aZDB-2-SCS | ||
999 |
_c16108 _d16108 |