{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:07Z","timestamp":1740122347166,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10586-017-0842-3","type":"journal-article","created":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T20:13:56Z","timestamp":1491336836000},"page":"333-346","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Estimation of software features based birthmark"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0126-9944","authenticated-orcid":false,"given":"Shah","family":"Nazir","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1812-236X","authenticated-orcid":false,"given":"Sara","family":"Shahzad","sequence":"additional","affiliation":[]},{"given":"Rodziah Binti","family":"Atan","sequence":"additional","affiliation":[]},{"given":"Haleem","family":"Farman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"key":"842_CR1","doi-asserted-by":"crossref","first-page":"721","DOI":"10.3233\/JCS-2005-13503","volume":"13","author":"C Collberg","year":"2005","unstructured":"Collberg, C., Sahoo, T.R.: Software watermarking in the frequency domain: implementation, analysis, and attacks. J. Comput. Secur. 13, 721\u2013755 (2005)","journal-title":"J. Comput. Secur."},{"key":"842_CR2","doi-asserted-by":"crossref","unstructured":"Myles, G., Collberg, C.: Software watermarking through register allocation: implementation, analysis, and attacks. In: Information Security and Cryptology\u2014ICISC 2003, vol. 2971, pp. 274\u2013293. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24691-6_21"},{"key":"842_CR3","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/1286821.1286826","volume":"29","author":"CS Collberg","year":"2007","unstructured":"Collberg, C.S., Thomborson, C., Townsend, G.M.: Dynamic graph-based software fingerprinting. ACM Trans. Program. Lang. Syst. 29, 35 (2007)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"842_CR4","doi-asserted-by":"crossref","unstructured":"Pieprzyk, J.: Fingerprints for copyright software protection. In: Information Security, vol. 1729, pp. 178\u2013190. Springer, Berlin (1999)","DOI":"10.1007\/3-540-47790-X_15"},{"key":"842_CR5","doi-asserted-by":"crossref","unstructured":"Bai, Y., Sun, X., Sun, G., Deng, X., Zhou, X.: Dynamic K-gram based software birthmark. Presented at the 19th Australian Conference on Software Engineering (2009)","DOI":"10.1109\/ASWEC.2008.4483257"},{"key":"842_CR6","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Liu, F., Luo, X., Yang, C.: A method based on feature matching to identify steganography software. In: Fourth International Conference on Multimedia Information Networking and Security, pp. 989\u2013994 (2012)","DOI":"10.1109\/MINES.2012.26"},{"key":"842_CR7","first-page":"1401","volume":"9","author":"Y Guo","year":"2014","unstructured":"Guo, Y., Wang, M., Luo, Y.: Identifying software theft based on classification of multi-attribute features. J. Softw. 9, 1401\u20131411 (2014)","journal-title":"J. Softw."},{"key":"842_CR8","doi-asserted-by":"crossref","unstructured":"Myles, G., Collberg, C.: Detecting software theft via whole program path birthmarks. In: Information Security, vol. 3225, pp. 404\u2013415. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-30144-8_34"},{"key":"842_CR9","doi-asserted-by":"crossref","unstructured":"Park, H., Choi, S., Lim, H.-I., Han, T.: Detecting Java theft based on static API Trace Birthmark. In: Advances in Information and Computer Security, vol. 5312, pp. 121\u2013135. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-89598-5_8"},{"key":"842_CR10","unstructured":"Aiken, A.: Moss: a system for detecting software plagiarism. University of California\u2013Berkeley. http:\/\/www.cs.berkeley.edu\/aiken\/moss.html (2005)"},{"key":"842_CR11","first-page":"535","volume":"47","author":"S Nazir","year":"2015","unstructured":"Nazir, S., Shahzad, S., Nizamani, Q.U.A., Amin, R., Shah, M.A., Keerio, A.: Identifying software features as birthmark. Sindh Univ. Res. J. (Sci. Ser.) 47, 535\u2013540 (2015)","journal-title":"Sindh Univ. Res. J. (Sci. Ser.)"},{"key":"842_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2015\/579390","volume":"2015","author":"S Nazir","year":"2015","unstructured":"Nazir, S., Shahzad, S., Khan, S.A., Ilyas, N.B., Anwar, S.: A novel rules based approach for estimating software birthmark. Sci. World J. 2015, 1\u20138 (2015)","journal-title":"Sci. World J."},{"key":"842_CR13","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1016\/j.cose.2012.03.004","volume":"31","author":"Y Zeng","year":"2012","unstructured":"Zeng, Y., Liu, F., Luo, X., Lian, S.: Abstract interpretation-based semantic framework for software birthmark. Comput. Secur. 31, 377\u2013390 (2012)","journal-title":"Comput. Secur."},{"key":"842_CR14","unstructured":"Tamada, H., Nakamura, M., Monden, A.: Design and evaluation of birthmarks for detecting theft of Java programs. In: Proceedings of IASTED International Conference on Software Engineering, pp. 569\u2013575 (2004)"},{"key":"842_CR15","doi-asserted-by":"crossref","unstructured":"Wang, X., Jhi, Y.-C., Zhu, S., Liu, P.: Detecting software theft via system call based birthmarks. Presented at the in Computer Security Applications Conference (2009)","DOI":"10.1109\/ACSAC.2009.24"},{"key":"842_CR16","doi-asserted-by":"crossref","unstructured":"Jhi, Y.-C., Wang, X., Jia, X., Zhu, S., Liu, P., Wu, D.: Value-based program characterization and its application to software plagiarism detection. Presented at the 33rd International Conference on Software Engineering (2011)","DOI":"10.1145\/1985793.1985899"},{"key":"842_CR17","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1093\/comjnl\/bxp095","volume":"54","author":"H Park","year":"2011","unstructured":"Park, H., Lim, H.-I., Choi, S., Han, T.: Detecting common modules in Java packages based on static object trace birthmark. Comput. J. 54, 108\u2013124 (2011)","journal-title":"Comput. J."},{"key":"842_CR18","doi-asserted-by":"crossref","unstructured":"Myles, G., Collberg, C.: K-gram based software birthmarks. Presented at the Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, New Mexico (2005)","DOI":"10.1145\/1066677.1066753"},{"key":"842_CR19","doi-asserted-by":"crossref","unstructured":"Xie, X., Liu, F., Lu, B., Chen, L.: A software birthmark based on weighted K-gram. In: IEEE International Conference on Intelligent Computing and Intelligent System (ICIS), pp. 400\u2013405 (2010)","DOI":"10.1109\/ICICISYS.2010.5658584"},{"key":"842_CR20","doi-asserted-by":"crossref","unstructured":"Wang, P., Jin, C., Jin, S.-W.: Software defect prediction scheme based on feature selection. In: Fourth International Symposium on Information Science and Engineering, pp. 477\u2013480 (2012)","DOI":"10.1109\/ISISE.2012.114"},{"key":"842_CR21","unstructured":"\u017divadinovi\u0107, J., Medi\u0107, Z., Maksimovi\u0107, D., Damnjanovi\u0107, A., Vuj\u010di\u0107, S.: Methods of effort estimation in software engineering. Presented at the International Symposium Engineering Management And Competitiveness. Zrenjanin, Serbia (2011)"},{"key":"842_CR22","unstructured":"Mohanty, S.K., Bisoi, A.K.: Software effort estimation approaches\u2014a review. In: International Journal of Internet Computing, pp. 82\u201388 (2012)"},{"key":"842_CR23","unstructured":"Faridul, H.S., Do\u00ebrr, G., Baudry, S.: Disparity estimation and disparity-coherent watermarking. In: SPIE Media Watermarking, Security, and Forensics, pp. 1\u20139 (2015)"},{"key":"842_CR24","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TIP.2011.2170696","volume":"21","author":"C Gottschlich","year":"2012","unstructured":"Gottschlich, C.: Curved-region-based ridge frequency estimation and curved Gabor filters for fingerprint image enhancement. IEEE Trans. Image Process. 21, 220\u2013227 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"842_CR25","unstructured":"Nazir, S., Shahzad, S., Zada, I., Khan, H.: Evaluation of software birthmarks using fuzzy analytic hierarchy process. In: Proceedings of the Fourth International Multi-topic Conference, pp. 171\u2013175 (2015)"},{"key":"842_CR26","first-page":"1","volume":"42","author":"S Nazir","year":"2016","unstructured":"Nazir, S., Shahzad, S., Riza, L.S.: Birthmark-based software classification using rough sets. Arabian J. Sci. Eng. 42, 1\u201313 (2016)","journal-title":"Arabian J. Sci. Eng."},{"key":"842_CR27","unstructured":"MATLAB, 7.10.0 ed. The MathWorks Inc, Natick (2010)"},{"key":"842_CR28","doi-asserted-by":"crossref","unstructured":"Wang, P., Jin, C., Jin, S.-W.: Software defect prediction scheme based on feature selection. In: 2012 Fourth International Symposium on Information Science and Engineering, pp. 477\u2013480 (2012)","DOI":"10.1109\/ISISE.2012.114"},{"key":"842_CR29","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Liu, F., Luo, X., Yang, C.: A method based on feature matching to identify steganography software. In: 2012 Fourth International Conference on Multimedia Information Networking and Security, pp. 989\u2013994 (2012)","DOI":"10.1109\/MINES.2012.26"},{"key":"842_CR30","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-2909-7","volume-title":"Software Similarity and Classification","author":"S Cesare","year":"2012","unstructured":"Cesare, S., Xiang, Y.: Software Similarity and Classification. Springer, London (2012)"},{"key":"842_CR31","unstructured":"Tamada, H., Okamoto, K., Nakamura, M., Monden, A., Matsumoto, K.-I.: Dynamic software birthmarks to detect the theft of windows applications. Presented at the International Symposium on Future Software Technology (2004)"},{"key":"842_CR32","doi-asserted-by":"crossref","unstructured":"Xin, Z., Chen, H., Wang, X., Liu, P., Zhu, S., Mao, B., et al.: Replacement attacks on behavior based software birthmark. In: LNCS, pp. 1\u201316 (2011)","DOI":"10.1007\/978-3-642-24861-0_1"},{"key":"842_CR33","doi-asserted-by":"crossref","unstructured":"Chan, P.P.F., Hui, L.C.K., Yiu, S.M.: Dynamic software birthmark for Java based on heap memory analysis. In: Communications and Multimedia Security, vol. 7025, pp. 94\u2013107. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-24712-5_8"},{"key":"842_CR34","doi-asserted-by":"crossref","unstructured":"Fukuda, K., Tamada, H.: A dynamic birthmark from analyzing operand stack runtime behavior to detect copied software. In: 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, pp. 505\u2013510 (2013)","DOI":"10.1109\/SNPD.2013.11"},{"key":"842_CR35","doi-asserted-by":"crossref","unstructured":"Lim, H.-I., Park, H., Choi, S., Han, T.: A static Java birthmark based on control flow edges. In: 23rd Annual IEEE International Computer Software and Applications Conference (COMPSAC), pp. 413\u2013420 (2009)","DOI":"10.1109\/COMPSAC.2009.62"},{"key":"842_CR36","doi-asserted-by":"crossref","unstructured":"Mahmood, Y., Pervez, Z., Sarwar, S., Ahmed, H.F.: Similarity level method based static software birthmarks. In: High Capacity Optical Networks and Enabling Technologies, pp. 205\u2013210 (2008)","DOI":"10.1109\/HONET.2008.4810236"},{"key":"842_CR37","doi-asserted-by":"crossref","unstructured":"Wang, Y., Liu, F., Zhao, Z., Lu, B., Xie, X.: Operand stack dependence based Java static software birthmark. Presented at the 10th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) (2013)","DOI":"10.1109\/FSKD.2013.6816359"},{"key":"842_CR38","doi-asserted-by":"crossref","unstructured":"Zhou, X., Sun, X., Sun, G., Yang, Y.: A combined static and dynamic software birthmark based on component dependence graph. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1416\u20131421 (2008)","DOI":"10.1109\/IIH-MSP.2008.145"},{"key":"842_CR39","unstructured":"Sun, G.: Software birthmark based on component dependence graph cluster. In: International Conference on Computer Application and System Modeling (ICCASM 2010), pp. 281\u2013291 (2010)"},{"key":"842_CR40","doi-asserted-by":"crossref","unstructured":"Choi, J., Han, Y., Cho, S.-J., Yoo, H.Y., Woo, J.: A static birthmark for MS windows applications using import address table. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 129\u2013134 (2013)","DOI":"10.1109\/IMIS.2013.159"},{"key":"842_CR41","doi-asserted-by":"crossref","unstructured":"Ma, L., Wang, Y., Liu, F., Chen, L.: Instruction-words based software birthmark. InFourth International Conference on Multimedia Information Networking and Security (MINES), pp. 909\u2013912 (2012)","DOI":"10.1109\/MINES.2012.131"},{"key":"842_CR42","unstructured":"Kim, H., Khoo, W.M., Li\u00f3, P.: Polymorphic attacks against sequence-based software birthmarks. In: 2nd Software Security and Protection Workshop (SSP\u201912), pp. 1\u20138 (2012)"},{"key":"842_CR43","first-page":"571","volume":"5","author":"D Lee","year":"2015","unstructured":"Lee, D., Choi, Y., Jung, J., Kim, J., Won, D.: An efficient categorization of the instructions based on binary excutables for dynamic software birthmark. Int. J. Inf. Educ. Technol. 5, 571\u2013576 (2015)","journal-title":"Int. J. Inf. Educ. Technol."},{"key":"842_CR44","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/2.53","volume":"21","author":"LA Zadeh","year":"1988","unstructured":"Zadeh, L.A.: Fuzzy logic. Computer 21, 83\u201393 (1988)","journal-title":"Computer"},{"key":"842_CR45","volume-title":"Fuzzy Logic: Intelligence, Control and Information","author":"J Yen","year":"1999","unstructured":"Yen, J., Langari, R.: Fuzzy Logic: Intelligence, Control and Information, 1st edn. Prentice-Hall, Upper Saddle River (1999)","edition":"1"},{"key":"842_CR46","doi-asserted-by":"crossref","unstructured":"Nazir, S., Anwar, S., Khan, M.A., Khan, H., Nazir, M.: A novel fuzzy logic based software component selection modeling. In: International Conference on Information Science and Application (ICISA), IEEE, Korea, pp. 1\u20136 (2012)","DOI":"10.1109\/ICISA.2012.6220925"},{"key":"842_CR47","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1016\/j.jss.2008.11.848","volume":"82","author":"S Choi","year":"2009","unstructured":"Choi, S., Park, H., Lim, H.-I., Han, T.: A static API birthmark for Windows binary executables. J. Syst. Softw. 82, 862\u2013873 (2009)","journal-title":"J. Syst. Softw."},{"key":"842_CR48","first-page":"1","volume":"12","author":"MI Yousuf","year":"2007","unstructured":"Yousuf, M.I.: Using experts\u2019 opinions through delphi technique. Pract. Assess. Res. Eval. 12, 1\u20138 (2007)","journal-title":"Pract. Assess. Res. Eval."},{"key":"842_CR49","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1287\/mnsc.9.3.458","volume":"9","author":"N Dalkey","year":"1963","unstructured":"Dalkey, N., Helmer, O.: An experimental application of the Delphi method to the use of experts. Manag. Sci. 9, 458\u2013467 (1963)","journal-title":"Manag. Sci."},{"key":"842_CR50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2014\/535970","volume":"2014","author":"S Nazir","year":"2014","unstructured":"Nazir, S., Anwar, S., Khan, S.A., Shahzad, S., Ali, M., Amin, R., et al.: Software component selection based on quality criteria using the analytic network process. Abstr. Appl. Anal. 2014, 1\u201312 (2014)","journal-title":"Abstr. Appl. Anal."},{"key":"842_CR51","unstructured":"Tian, Z., Zheng, Q., Fan, M., Zhuang, E., Wang, H., Liu, T.: DBPD: a dynamic birthmark-based software plagiarism detection tool. Presented at the SEKE (2014)"},{"key":"842_CR52","doi-asserted-by":"crossref","unstructured":"Tsuzaki, T., Yamamoto, T., Tamada, H., Monden, A.: A fuzzy hashing technique for large scale software birthmarks. Presented at the 15th International Conference on Computer and Information Science (2016)","DOI":"10.1109\/ICIS.2016.7550868"},{"key":"842_CR53","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1080\/02664763.2016.1169256","volume":"44","author":"Y Luo","year":"2017","unstructured":"Luo, Y.: Statistics and recognition for software birthmark based on clustering analysis. J. Appl. Stat. 44, 308\u2013324 (2017)","journal-title":"J. Appl. Stat."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0842-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0842-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0842-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T12:16:09Z","timestamp":1568981769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0842-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["842"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0842-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2017,4,4]]}}}