[1] GROVER D. Program Identification[M]. London:Cambridge University Press,1989:119-150. [2] MYLES G, COLLBERG C. K-gram based software birthmarks[C]//Proceedings of the 2005 ACM Symposium on Applied Computing. New York:ACM, 2005:314-318. [3] PARK H, CHOI S, LIM H, et al. Detecting Java theft based on static API trace birthmark[C]//Proceedings of the 3rd International Workshop on Security:Advances in Information and Computer Security. Berlin:Springer, 2008:121-135. [4] 张杏,徐江峰,李晓阳. 基于系统函数调用频率与指令基本块的软件胎记[J].计算机工程,2016,42(10):86-90.(ZHANG X, XU J F, LI X Y. Software birthmark based on system function call frequency and instruction basic block[J]. Computer Engineering, 2016,42(10):86-90.). [5] 王勇.基于Java平台的静态软件胎记技术研究[D].郑州:信息工程大学,2013:4-6.(WANG Y. Study on static software birthmarking based on Java platform[D]. Zhengzhou:Information Engineering University, 2013:4-6.) [6] 黄寿孟,高华玲,潘玉霞. 软件相似性分析算法的研究综述[J]. 计算机科学,2016,43(S1):467-470.(HUANG S M, GAO H L, PAN Y X. Summary of research on similarity analysis of software[J]. Computer Science, 2016,43(S1):467-470.) [7] 范铭,刘均,郑庆华,等. 基于栈行为动态胎记的软件抄袭检测方法[J]. 山东大学学报(理学版),2014,49(9):9-16.(FAN M, LIU J, ZHENG Q H, et al. SODB:a novel method for software plagiarism detection based on stack operation dynamic birthmark[J]. Journal of Shandong University (Natural Science), 2014, 49(9):9-16.) [8] 王开云,孔思淇,付云生,等.两种基于双向比较的最长公共子串算法[J].计算机研究与发展,2013,50(11):2444-2454.(WANG K Y, KONG S Q, FU Y S, et al. Two longest common substring algorithms based on bi-directional comparison[J]. Journal of Computer Research and Development, 2013, 50(11):2444-2454.) [9] 张毅超,车玫,马骏. 求最长公共子串问题的算法分析[J]. 计算机仿真,2007,24(12):97-100.(ZHANG Y C, CHE M, MA J. Analysis of the longest common substring algorithm[J]. Computer Simulation, 2007, 24(12):97-100.) [10] 马志强,张泽广,闫瑞,等.基于N-Gram模型的蒙古语文本语种识别算法的研究[J].中文信息学报,2016,30(1):133-139.(MA Z Q, ZHANG Z G, YAN R, et al. N-Gram based language identification for Mongolian text[J]. Journal of Chinese Information Processing, 2016, 30(1):133-139.) [11] 陈林,刘粉林,芦斌,等.基于k-gram频数的静态软件胎记[J].计算机工程,2011,37(4):46-48.(CHEN L, LIU F L, LU B, et al. Static software birthmark based on k-gram frequency[J]. Computer Engineering, 2011, 37(4):46-48.) [12] 田振洲,刘烃,郑庆华,等.软件抄袭检测研究综述[J].信息安全学报,2016,1(3):52-76.(TIAN Z Z, LIU T, ZHENG Q H, et al. Software plagiarism detection:a survey[J]. Journal of Cyber Security, 2016, 1(3):52-76.) [13] 喻宝禄,段迅,吴云. BP神经网络数据预测模型的建立及应用[J].计算机与数字程,2016,44(3):482-486.(YU B L, DUAN X, WU Y. Establishment and application of data prediction model based on BP neural network[J]. Computer and Digital Engineering, 2016, 44(3):482-486.) [14] 王广南.基于系统调用依赖图的程序相似性研究[D].长沙:湖南大学,2009:27-29.(WANG G N. Similarity of programs based on system call dependency graphs[D]. Changsha:Hunan University, 2009:27-29.) [15] SCHULER D, DALLMEIER V, LINDIG C. A dynamic birthmark for Java[EB/OL].[2017-03-02]. https://www.st.cs.uni-saarland.de/birthmarking/schuler-ase-2007.pdf. |