000 -LEADER |
fixed length control field |
02657nam a22004335i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310151110.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
120302s2012 xxk| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781447129097 |
|
978-1-4471-2909-7 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
264 #1 - |
-- |
London : |
-- |
Springer London, |
-- |
2012. |
912 ## - |
-- |
ZDB-2-SCS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Cesare, Silvio. |
Relator term |
author. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Software Similarity and Classification |
Medium |
[electronic resource] / |
Statement of responsibility, etc |
by Silvio Cesare, Yang Xiang. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XIV, 88p. 26 illus. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
SpringerBriefs in Computer Science, |
International Standard Serial Number |
2191-5768 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Preface -- Acknowledgements -- Introduction -- Taxonomy of Program Features -- Program Transformations and Obfuscations -- Formal Methods of Program Analysis -- Static Analysis of Binaries -- Dynamic Analysis -- Feature Extraction -- Software Birthmark Similarity -- Software Similarity Searching and Classification -- Applications -- Future Trends and Conclusion. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Data protection. |
|
Topical term or geographic name as entry element |
Computers |
General subdivision |
Law and legislation. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Systems and Data Security. |
|
Topical term or geographic name as entry element |
Legal Aspects of Computing. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Xiang, Yang. |
Relator term |
author. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9781447129080 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-1-4471-2909-7 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |