{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:21:29Z","timestamp":1725578489636},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195129"},{"type":"electronic","value":"9783642195136"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_2","type":"book-chapter","created":{"date-parts":[[2011,3,7]],"date-time":"2011-03-07T01:58:50Z","timestamp":1299463130000},"page":"19-26","source":"Crossref","is-referenced-by-count":2,"title":["Software Piracy Forensics: The Need for Further Developing AFC"],"prefix":"10.1007","author":[{"given":"S. Santhosh","family":"Baboo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P. Vinod","family":"Bhattathiripad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Santhosh Baboo, S., Vinod Bhattathiripad, P. (under editorial review): Software Piracy Forensics: Impact and Implications of post-piracy modifications. Digital Investigation - The International Journal of Digital Forensics & Incident Response (2010)"},{"key":"2_CR2","unstructured":"van der Ejik, P.: Comparative Discourse Analysis of Parallel texts, eprint arXiv:cmp-lg\/9407022. Digital Equipment Corporation, Ratelaar 38, 3434 EW, Nieuwegein, The Netherlands, CMP-lg\/ 9407022 (1994)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Yamamoto, T., Matsushita, M., Kamiya, T., Inoue, K.: Measuring Similarity of Large Software Systems Based on Source Code Correspondence. IEEE Transactions on Software Engineering, XX, Y (2004)","DOI":"10.1007\/11497455_41"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Lancaster, T., Culwin, F.: A Comparison of Source Code Plagiarism Detection Engines. Computer Science Education (2004), http:\/\/www.informaworld.com\/","DOI":"10.1080\/08993400412331363843"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Li, C.-T.: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions. In: Information Science Reference, ch. XX (2010), http:\/\/www.info-sci-ref.com","DOI":"10.4018\/978-1-60566-836-9"},{"key":"2_CR6","unstructured":"Frantzeskou, G., Stamatatos, E., Gritzalis, S., Chaski, C. E., Howald, B. S.: Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method. International Journal of Digital Evidence 6(1) (2007)"},{"key":"2_CR7","unstructured":"United States Court of Appeals Judge John Walker, Protectable Nuggests: Drawing the Line Between Idea and Expression in computer Program Copyright Protection, 44. Journal of the Copyright Society of USA 44(79) (1996)"},{"key":"2_CR8","unstructured":"Spafford, E.H., Weeber, S.A.: Software forensics: Can we track the code back to its authors? Purdue Technical Report CSD\u2013TR 92\u2013010, SERC Technical Report SERC\u2013TR 110\u2013P, Department of Computer Sciences, Purdue University (1992)"},{"key":"2_CR9","unstructured":"European Software Analysis Laboratory, The SIMILE Workshop: Automating the detection of counterfeit software (2007), www.esalab.com"},{"key":"2_CR10","unstructured":"Raysman, R., Brown, P.: Copyright Infringement of computer software and the Altai test. New York Law Journal 235(89) (2006)"},{"key":"2_CR11","unstructured":"United States District Court of Massachusetts, Memorandum and Order, Civil Action number 07-12157 PBS, Real View LLC. Vs. 20-20 Technologies, p. 2 (2010)"},{"key":"2_CR12","unstructured":"United States Court of Appeals, Second Circuit, Computer Associates International, Inc. v. Altai, Inc., 982 F.2d 693; 1992 U.S. App. LEXIS 33369; 119 A.L.R. Fed. 741; 92 Cal. Daily, Op. Service 10213, January 9, 1992, Argued, December 17, 1992, Filed (1992)"},{"key":"2_CR13","unstructured":"United States Court of Appeals, Second Circuit, Corrected Amicus Brief filed by Mark M. Arkin, Counsel of 5 computer scientists regarding software copyright and trade secret cases \u2013 Observation of Abstraction, Filtration and Comparison test, on appeal from the United States district court for the southern district of New York, on the suit Harbour Software Inc. Vs Applied Systems Inc., 97-7197L (1997)"},{"key":"2_CR14","unstructured":"Hollar, L.A.: Legal Protection Of Digital Information. BNA Books (2002)"},{"issue":"4","key":"2_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1080\/15567280903140938","volume":"2","author":"S. Santhosh Baboo","year":"2009","unstructured":"Santhosh Baboo, S., Vinod Bhattathiripad, P.: Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Technique\u2019. Journal of Digital Forensic Practice\u00a02(4), 175\u2013182 (2009)","journal-title":"Journal of Digital Forensic Practice"},{"key":"2_CR16","unstructured":"United States Court of Appeals, Second Circuit, Brief of Amici Curiae of 17 technical experts, in the case Universal City Studios, Inc., et al. Vs. Eric Corley, A\/K\/A Emmanuel Goldstein and 2600 enterprises (2001)"},{"key":"2_CR17","unstructured":"Vinod Bhattathiripad, P.: Judiciary-friendly computer forensics, Kerala Law Times, Part 13 & Index, June 29, p. 54 (2009)"},{"issue":"2","key":"2_CR18","first-page":"317","volume":"5","author":"R. Davis","year":"1992","unstructured":"Davis, R.: The nature of software and its consequences for establishing and evaluating piracy. Software Law Journal\u00a05(2), 317\u2013325 (1992)","journal-title":"Software Law Journal"},{"key":"2_CR19","unstructured":"Kremen, S.H.: Presentation of Technical Evidence by Experts in Computer Related Intellectual Property Litigation. Computer Forensics Online\u00a02(1) (1998)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T01:13:09Z","timestamp":1637370789000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}