Software Similarity and Classification (Record no. 21105)

000 -LEADER
fixed length control field 02657nam a22004335i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310151110.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120302s2012 xxk| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781447129097
978-1-4471-2909-7
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
264 #1 -
-- London :
-- Springer London,
-- 2012.
912 ## -
-- ZDB-2-SCS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Cesare, Silvio.
Relator term author.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Software Similarity and Classification
Medium [electronic resource] /
Statement of responsibility, etc by Silvio Cesare, Yang Xiang.
300 ## - PHYSICAL DESCRIPTION
Extent XIV, 88p. 26 illus.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title SpringerBriefs in Computer Science,
International Standard Serial Number 2191-5768
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface -- Acknowledgements -- Introduction -- Taxonomy of Program Features -- Program Transformations and Obfuscations -- Formal Methods of Program Analysis -- Static Analysis of Binaries -- Dynamic Analysis -- Feature Extraction -- Software Birthmark Similarity -- Software Similarity Searching and Classification -- Applications -- Future Trends and Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Data protection.
Topical term or geographic name as entry element Computers
General subdivision Law and legislation.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Systems and Data Security.
Topical term or geographic name as entry element Legal Aspects of Computing.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Xiang, Yang.
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781447129080
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4471-2909-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-08AUM Main Library2014-04-08 2014-04-08 E-Book   AUM Main Library005.8