Comparative Analysis of Technical Methods for Detecting Software Thefts

被引:1
|
作者
Lim, Hyun-Il [1 ]
机构
[1] Kyungnam Univ, Dept Comp Engn, Chang Won, Gyeongsangnam D, South Korea
关键词
Plagiarism detection; software birthmark; software theft detection; software watermark;
D O I
10.17706/jcp.11.1.26-32
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Software plays an important role in current computing environments, and it is protected as intellectual property of its author. However, the cases of software thefts are increasing every year. To deal with the problem, there have been researches on detecting software thefts. In this paper, we introduce technical methods for detecting software thefts, and compare characteristics of the methods according to several performance evaluation criteria.
引用
收藏
页码:26 / 32
页数:7
相关论文
共 50 条
  • [1] Comparative analysis of methods for detecting interacting loci
    Li Chen
    Guoqiang Yu
    Carl D Langefeld
    David J Miller
    Richard T Guy
    Jayaram Raghuram
    Xiguo Yuan
    David M Herrington
    Yue Wang
    BMC Genomics, 12
  • [2] Comparative analysis of methods for detecting interacting loci
    Chen, Li
    Yu, Guoqiang
    Langefeld, Carl D.
    Miller, David J.
    Guy, Richard T.
    Raghuram, Jayaram
    Yuan, Xiguo
    Herrington, David M.
    Wang, Yue
    BMC GENOMICS, 2011, 12
  • [3] Comparative Analysis of Methods for Detecting Fraudulent Transactions
    Kondratev, Igor A.
    Bazanov, Vadim V.
    Uskov, Daniil A.
    Kuchebo, Anna, V
    Sereda, Tatyana E.
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 468 - 472
  • [4] THE COMPARATIVE ANALYSIS OF METHODS FOR DETECTING PEDESTRIANS FOR UNMANNED VEHICLES
    Ziyatdinov, Rustem R.
    Biktimirov, Ravil A.
    Klochkova, Ksenia V.
    IIOAB JOURNAL, 2019, 10 : 60 - 64
  • [5] Customizing k-Gram based birthmark through partial matching in detecting software thefts
    Lim, Hyun-Il
    Proceedings - International Computer Software and Applications Conference, 2013, : 1 - 4
  • [6] Customizing k-gram Based Birthmark through Partial Matching in Detecting Software Thefts
    Lim, Hyun-il
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 1 - 4
  • [7] Comprehensive comparative analysis of methods and software for identifying viral integrations
    Chen, Xun
    Kost, Jason
    Li, Dawei
    BRIEFINGS IN BIOINFORMATICS, 2019, 20 (06) : 2088 - 2097
  • [8] COMPARATIVE SOFTWARE METHODS - INTRODUCTION
    WILLIAMS, LG
    JOURNAL OF SYSTEMS AND SOFTWARE, 1989, 9 (02) : 79 - 80
  • [9] A Technical Survey on Methods for Detecting Rogue Access Points
    Kim, Myoungsu
    Kwon, Soonhong
    Elmazi, Donald
    Lee, Jong-Hyouk
    Barolli, Leonard
    Yim, Kangbin
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2019, 2020, 994 : 215 - 226
  • [10] A Comparative Analysis of Reliability Assessment Methods for Web-based Software
    Park, Jinhee
    Seo, Yeong-Seok
    Baik, Jongmoon
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2013, 1 (03) : 34 - 47