{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:41:32Z","timestamp":1775054492590,"version":"3.50.1"},"reference-count":36,"publisher":"Pleiades Publishing Ltd","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1134\/s0361768819080152","type":"journal-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T15:02:28Z","timestamp":1579014148000},"page":"581-589","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Graphs Resemblance based Software Birthmarks through Data Mining for Piracy Control"],"prefix":"10.1134","volume":"45","author":[{"given":"S.","family":"Sarwar","sequence":"first","affiliation":[]},{"given":"Z. Ul.","family":"Qayyum","sequence":"additional","affiliation":[]},{"given":"M.","family":"Safyan","sequence":"additional","affiliation":[]},{"given":"M.","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Mahmood","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2020,1,14]]},"reference":[{"key":"7102_CR1","unstructured":"Proc. 8th Annu. BSA Global Software 2013 Piracy Study, Washington, DC: Bus. Software Alliance, 2013."},{"key":"7102_CR2","doi-asserted-by":"crossref","unstructured":"Anckaert, B., De Sutter, B., Chanet, D., and Bos-schere, K., Steganography for executables and code transformation signatures, Proc. 7th Int. Conf. on Information Security and Cryptology, Seoul, 2005, pp. 425\u2013439.","DOI":"10.1007\/11496618_31"},{"key":"7102_CR3","doi-asserted-by":"crossref","unstructured":"Fu, B., Richard G., and Chen, Y., Some new approaches for preventing software tampering, Proc. 44th Annu. Southeast Regional Conf., Melbourne, FL, 2006, pp. 655\u2013660.","DOI":"10.1145\/1185448.1185592"},{"key":"7102_CR4","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"S. Collberg","year":"2002","unstructured":"Collberg, S. and Thomborson, C., \u201cWatermarking, tamper-proofing, and obfuscation-tools for software protection, IEEE Trans. Software Eng., 2002, vol. 28, pp. 735\u2013746.","journal-title":"IEEE Trans. Software Eng"},{"key":"7102_CR5","unstructured":"Udupa, S.K., Debray, K., and Madou, M., Deobfuscation: reverse engineering obfuscated code, Proc. 16th Conf. on Reverse Engineering, Lille, 2009, pp. 10\u201319."},{"key":"7102_CR6","doi-asserted-by":"crossref","unstructured":"Palsberg, J., Krishnaswamy, S., and Kwon, M., Experience with software watermarking, Proc. 19th Computer Security Applications Conf., Las Vegas, 2003, pp. 308\u2013316.","DOI":"10.1109\/ACSAC.2000.898885"},{"key":"7102_CR7","doi-asserted-by":"crossref","unstructured":"Bai, Y., Sun, X., Sun, G., Deng, X., and Zhou, X., \u201cDynamic k-gram based software birthmark, Proc. 19th Australian Conf. on Software Engineering, Perth, 2008, pp. 644\u2013649.","DOI":"10.1109\/ASWEC.2008.4483257"},{"key":"7102_CR8","doi-asserted-by":"crossref","unstructured":"Mahmood, Y., Pervez, Z., Sarwar, S., and Ahmed, H.F., Similarity level method based static software birthmarks, Proc. Int. Symp. on High Capacity Optical Networks and Enabling Technologies, Penang, 2008, pp. 205\u2013210.","DOI":"10.1109\/HONET.2008.4810236"},{"key":"7102_CR9","doi-asserted-by":"crossref","unstructured":"Schuler, D., Dallmeier, V., and Lindig, C., A dynamic birthmark for Java, Proc. 22nd IEEE\/ACM Int. Conf. on Automated Software Engineering, Atlanta, 2007, pp. 274\u2013283.","DOI":"10.1145\/1321631.1321672"},{"key":"7102_CR10","doi-asserted-by":"publisher","first-page":"579390","DOI":"10.1155\/2015\/579390","volume":"2015","author":"S. Nazir","year":"2015","unstructured":"Nazir, S., Shahzad, S., Khan, S.A., Alias, N.B., and Anwar, S., A novel rules based approach for estimating software birthmark, Sci. World J., 2015, vol. 2015, art. ID 579390.","journal-title":"Sci. World J."},{"key":"7102_CR11","unstructured":"Jorge, E.N., Pirmez, L., Costa, O., Boccardo, R., and Bento, M., Tiny watermark: a code obfuscation-based software watermarking framework for wireless sensor networks, Proc. Int. Conf. on Wireless Networks, ICWN\u201914, Las Vegas, 2014."},{"key":"7102_CR12","first-page":"1","volume":"3","author":"N. Nayakoji","year":"2014","unstructured":"Nayakoji, N. and Sonavane, S., JavaScript theft detection using birthmark and subgraph isomorphism, J. Eng. Comput. Appl. Sci., 2014, vol. 3, pp. 1\u20135.","journal-title":"J. Eng. Comput. Appl. Sci"},{"key":"7102_CR13","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.11591\/telkomnika.v12i2.4215","volume":"12","author":"S. Che","year":"2014","unstructured":"Che, S. and Wang, Y., A software watermarking based on PE file with tamper-proof function, TELKOMNIKA Indones. J. Electron. Eng., 2014, vol. 12, pp. 1012\u20131021.","journal-title":"TELKOMNIKA Indones. J. Electron. Eng"},{"key":"7102_CR14","volume-title":"Concepts and Techniques in Software Watermarking and Obfuscation","author":"F. Zhu","year":"2007","unstructured":"Zhu, F., Concepts and Techniques in Software Watermarking and Obfuscation, Auckland: Research Space, 2007."},{"key":"7102_CR15","series-title":"Detecting software theft via whole program path birthmarks","volume-title":"Information Security","author":"G. Myles","year":"2004","unstructured":"Myles, G. and Collberg, C., Detecting software theft via whole program path birthmarks, in Information Security, New York: Springer-Verlag, 2004, pp. 404\u2013415."},{"key":"7102_CR16","doi-asserted-by":"crossref","unstructured":"Myles, G. and Collberg, C., K-gram based software birthmarks, Proc. 2005 ACM Symp. on Applied Computing, Santa Fe, 2005, pp. 314\u2013318.","DOI":"10.1145\/1066677.1066753"},{"key":"7102_CR17","doi-asserted-by":"crossref","unstructured":"Tian, Z., Liu, T., and Zheng, Q., A new thread-aware birthmark for plagiarism detection of multithreaded programs, Proc. 38th Int. Conf. on Software Engineering Companion, Austin, 2016, pp. 734\u2013736.","DOI":"10.1145\/2889160.2892653"},{"key":"7102_CR18","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.jss.2016.06.014","volume":"119","author":"Z. Tian","year":"2016","unstructured":"Tian, Z., Liu, T., and Zheng, Q., Exploiting thread-related system calls for plagiarism detection of multithreaded programs, J. Syst. Software, 2016, vol. 119, 136\u2013148.","journal-title":"J. Syst. Software"},{"key":"7102_CR19","volume-title":"Survey on digital watermarking\u2014a digital forensics & security application","author":"S. Bhattacharya","year":"2014","unstructured":"Bhattacharya, S., Survey on digital watermarking\u2014a digital forensics & security application, Int. J. Piracy Control, 2014, vol. 4."},{"key":"7102_CR20","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A. Khan","year":"2014","unstructured":"Khan, A., Siddiqa, A., and Munib, S., A recent survey of reversible watermarking techniques, Inf. Sci., 2014, vol. 279, pp. 251\u2013272.","journal-title":"Inf. Sci"},{"key":"7102_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhang, X., and Jiang, X., AppInk: watermarking android apps for repackaging deterrence, Proc. 8th ACM SIGSAC Symp. on Information, Computer and Communications Security, Hangzhou, 2013, pp. 1\u201312.","DOI":"10.1145\/2484313.2484315"},{"key":"7102_CR22","doi-asserted-by":"crossref","unstructured":"Ren, C., Chen, K., and Liu, P., Droidmarking: resilient software watermarking for impeding android application repackaging, Proc. 29th ACM\/IEEE Int. Conf. on Automated Software Engineering, Vasteras, 2014, pp.\u00a0635\u2013646.","DOI":"10.1145\/2642937.2642977"},{"key":"7102_CR23","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3923\/jse.2015.410.418","volume":"9","author":"G. Sun","year":"2015","unstructured":"Sun, G., Fan, X., Fu, S., Song, X., and Luo, H., Software watermarking in the cloud: analysis and rigorous theoretic treatment, J. Software Eng., 2015, vol. 9, pp.\u00a0410\u2013418.","journal-title":"J. Software Eng"},{"key":"7102_CR24","first-page":"117","volume":"1","author":"P. Rubini","year":"2013","unstructured":"Rubini, P. and Leela, S., A survey on plagiarism detection in text mining, Int. J. Res. Comput. Appl. Rob., 2013, vol. 1, p. 117.","journal-title":"Int. J. Res. Comput. Appl. Rob"},{"key":"7102_CR25","doi-asserted-by":"publisher","first-page":"3756","DOI":"10.1016\/j.eswa.2012.12.082","volume":"40","author":"G. Oberreuter","year":"2013","unstructured":"Oberreuter, G. and VelaSquez, J.D., Text mining applied to plagiarism detection: the use of words for detecting deviations in the writing style, Exp. Syst. Appl., 2013, vol. 40, pp. 3756\u20133763.","journal-title":"Exp. Syst. Appl"},{"key":"7102_CR26","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/19393555.2014.975557","volume":"23","author":"H. Rana","year":"2014","unstructured":"Rana, H. and Stamp, M., Hunting for pirated software using metamorphic analysis, Inf. Secur. J. Global Perspect., 2014, vol. 23, pp. 68\u201385.","journal-title":"Inf. Secur. J. Global Perspect"},{"key":"7102_CR27","unstructured":"Costa, M. and Gong, Z., Web structure mining: an introduction, Proc. IEEE Int. Conf. on Software Security Information Acquisition, Piscataway, NJ: Inst. Electr. Electron. Eng., 2005, p. 6."},{"key":"7102_CR28","doi-asserted-by":"crossref","unstructured":"Vemparala, S., Di Troia, F., Corrado, V., Austin, H., and Stamo, M., Malware detection using dynamic birthmarks, Proc. ACM Int. Workshop on Security and Privacy Analytics, New Orleans, 2016, pp. 41\u201346.","DOI":"10.1145\/2875475.2875476"},{"key":"7102_CR29","volume-title":"A q-gram birthmarking approach to predicting reusable hardware, Proc. Design, Automation & Test in Europe Conf. & Exhibition","author":"K. Zeng","year":"2016","unstructured":"Zeng, K. and Athanas, P., A q-gram birthmarking approach to predicting reusable hardware, Proc. Design, Automation & Test in Europe Conf. & Exhibition (DATE), Dresden, 2016, pp. 1112\u20131115."},{"key":"7102_CR30","series-title":"As strong as the weakest link: mining diverse cliques in weighted graphs","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"P. Bogdanov","year":"2013","unstructured":"Bogdanov, P., Baumer, B., and Basu, P., As strong as the weakest link: mining diverse cliques in weighted graphs, in Machine Learning and Knowledge Discovery in Databases, New York: Springer-Verlag, 2013, pp.\u00a0525\u2013540."},{"key":"7102_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1117454.1117456","volume":"7","author":"L. Getoor","year":"2005","unstructured":"Getoor, L. and Diehl, P., Link mining: a survey, ACM SIGKDD Explor. Newslett., 2005, vol. 7, pp. 3\u201312.","journal-title":"ACM SIGKDD Explor. Newslett"},{"key":"7102_CR32","first-page":"43","volume":"14","author":"D. Kavitha","year":"2011","unstructured":"Kavitha, D., Rao, M., and Babu, K., A survey on assorted approaches to graph data mining, Int. J. Comput. Appl., 2011, vol. 14, pp. 43\u201346.","journal-title":"Int. J. Comput. Appl"},{"key":"7102_CR33","doi-asserted-by":"publisher","first-page":"2148","DOI":"10.1093\/ietisy\/e88-d.9.2148","volume":"88","author":"H. Tamada","year":"2005","unstructured":"Tamada, H., Nakamura, M., and Monden, A., Java birthmarks\u2014detecting the software theft, IEICE Trans. Inf. Syst., 2005, vol. 88, pp. 2148\u20132158.","journal-title":"IEICE Trans. Inf. Syst"},{"key":"7102_CR34","unstructured":"http:\/\/www.sorceforge.net. Accessed November 2, 2017."},{"key":"7102_CR35","doi-asserted-by":"publisher","first-page":"1890","DOI":"10.1109\/TIFS.2018.2806891","volume":"13","author":"M. Fan","year":"2018","unstructured":"Fan, M., Liu, J., Luo, X., et al., Android malware familial classification and representative sample selection via frequent sub-graph analysis, IEEE Trans. Inf. Forensics Secur., 2018, vol. 13, pp. 1890\u20131905.","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"7102_CR36","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TSE.2017.2688383","volume":"44","author":"Z. Tian","year":"2018","unstructured":"Tian, Z., Liu, T., Zheng, Q., et al., Reviving sequential program nirthmarking for multithreaded software plagiarism detection, IEEE Trans. Software Eng., 2018, vol. 44, pp. 491\u2013511.","journal-title":"IEEE Trans. Software Eng"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768819080152.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768819080152","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768819080152.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:43:12Z","timestamp":1775011392000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768819080152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":36,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7102"],"URL":"https:\/\/doi.org\/10.1134\/s0361768819080152","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"18 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}