|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4471-2909-7 |
003 |
DE-He213 |
005 |
20220113131203.0 |
007 |
cr nn 008mamaa |
008 |
120302s2012 xxk| s |||| 0|eng d |
020 |
|
|
|a 9781447129097
|9 978-1-4471-2909-7
|
024 |
7 |
|
|a 10.1007/978-1-4471-2909-7
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Cesare, Silvio.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Software Similarity and Classification
|h [electronic resource] /
|c by Silvio Cesare, Yang Xiang.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a London :
|b Springer London :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XIV, 88 p. 26 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
505 |
0 |
|
|a Preface -- Acknowledgements -- Introduction -- Taxonomy of Program Features -- Program Transformations and Obfuscations -- Formal Methods of Program Analysis -- Static Analysis of Binaries -- Dynamic Analysis -- Feature Extraction -- Software Birthmark Similarity -- Software Similarity Searching and Classification -- Applications -- Future Trends and Conclusion.
|
520 |
|
|
|a Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computers-Law and legislation.
|
650 |
|
0 |
|a Information technology-Law and legislation.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
700 |
1 |
|
|a Xiang, Yang.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781447129080
|
776 |
0 |
8 |
|i Printed edition:
|z 9781447129103
|
830 |
|
0 |
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4471-2909-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|