Sciweavers

112 search results - page 7 / 23
» Behavior based software theft detection
Sort
View
ICSM
1998
IEEE
13 years 11 months ago
Detection of Logical Coupling Based on Product Release History
Code-based metrics such as coupling and cohesion are used to measure a system's structural complexity. But dealing with large systems--those consisting of several millions of...
Harald Gall, Karin Hajek, Mehdi Jazayeri
SEKE
2007
Springer
14 years 1 months ago
Real-Time Trust Management in Agent Based Online Auction Systems
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...
Rinkesh Patel, Haiping Xu, Ankit Goel
COMPSAC
2009
IEEE
14 years 2 months ago
A Static Java Birthmark Based on Control Flow Edges
—A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer i...
Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Ha...
RAID
2009
Springer
14 years 2 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
FASE
2003
Springer
14 years 23 days ago
Detecting Implied Scenarios Analyzing Non-local Branching Choices
Scenarios are powerful tools to model and analyze software systems. However, since they do not provide a complete description of the system, but just some possible execution paths,...
Henry Muccini