[1] Mahmood Y, Sarwar S, Pervez Z, et al.Method based static software birthmarks:A new approach to derogate software piracy[A].Proceedings of the 2nd International Conference on Computer, Control and Communication[C].Karachi:IEEE, 2009.149-155.[2] Xin Z, Chen H, Wang X, et al.Replacement attacks on behavior based software birthmark[J].Information Security, 2011, 11(5):1-16.[3] Myles G, Collberg C.K-gram based software birthmarks[A].Proceedings of the symposium on Applied computing[C].New York:ACM, 2005.314-318.[4] Lu B, Liu F, Ge X, et al.Feature n-gram set based software zero-watermarking[A].Proceedings of the International Symposiums on Information Processing[C].Moscow:IEEE, 2008.607-611.[5] Danicic S, Hierons R M, Laurence M R.On the computational complexity of dynamic slicing problems for program schemas[J].Mathematical Structures in Computer Science, 2011, 21(06):1339-1362.[6] 刘巍伟, 石勇, 郭煜, 等.一种基于综合行为特征的恶意代码识别方法[J].电子学报, 2009, 37(4):696-700. Liu Wei-wei, Shi Yong, Guo Yu, et al.A malicious code detection method based on integrated bethavior characterization[J].Acta Electronica Sinica, 2009, 37(4):696-700.(in Chinese)[7] Tamada H, Okamoto K, Nakamura M, et al.Dynamic software birthmarks to detect the theft of windows applications[A].Proceedings of the 8th International Symposium on Future Software Technology[C].Xi'an, China:Tokyo Software Engineers Association, 2004.37-43.[8] Proietti M, Pettorossi A.Semantics preserving transformation rules for Prolog[A].Proceedings of the SIGPLAN symposium on Partial evaluation and semantics-based program manipulation[C].New York:ACM, 1991.274-284.[9] Tamada H, Nakamura M, Monden A, et al.Design and evaluation of birthmarks for detecting theft of java programs[A].Proceedings of the International Conference on Software Engineering[C].Austria:ACTA, 2004.569-575.[10] 鲍明, 管鲁阳, 李晓东, 等.基于欧氏距离分布熵的特征优化研究[J].电子学报, 2007, 35(3):469-473. Bao Ming, Guan Lu-yang, Li Xiao-dong, et al.A study on optimum classification character based on the distributive entropy of euclidian distance[J].Acta Electronica Sinica, 2007, 35(3):469-473.(in Chinese)[11] Gruvaeus G., Wainer H.Two additions to hierarchical cluster analysis[J].British Journal of Mathematical and Statistical Psychology, 2011, 25(2):200-206.[12] 蒋盛益, 郑琪, 张倩生.基于聚类的特征选择方法[J].电子学报, 2008, 36(12A):157-162. Jiang Sheng-yi, Zheng Qi, Zhang Qian-sheng.Ckyster-based feature selection[J].Acta Electronica Sinica, 2008, 36(12A):157-162.(in Chinese) |