{"id":"https://openalex.org/W2951187637","doi":"https://doi.org/10.1134/s0361768819080152","title":"Graphs Resemblance based Software Birthmarks through Data Mining for Piracy Control","display_name":"Graphs Resemblance based Software Birthmarks through Data Mining for Piracy Control","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W2951187637","doi":"https://doi.org/10.1134/s0361768819080152","mag":"2951187637"},"language":"en","primary_location":{"id":"doi:10.1134/s0361768819080152","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768819080152","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1134/S0361768819080152","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042109913","display_name":"Sohail Sarwar","orcid":"https://orcid.org/0000-0001-7565-439X"},"institutions":[{"id":"https://openalex.org/I99165933","display_name":"University of Gujrat","ror":"https://ror.org/01xe5fb92","country_code":"PK","type":"education","lineage":["https://openalex.org/I99165933"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"S. Sarwar","raw_affiliation_strings":["Department of Computer Science, University of Gujrat, Jalalpur Jattan Road, 50700, Gujrat, Punjab, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Gujrat, Jalalpur Jattan Road, 50700, Gujrat, Punjab, Pakistan","institution_ids":["https://openalex.org/I99165933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052391962","display_name":"Zia Ul Qayyum","orcid":"https://orcid.org/0000-0003-4230-6895"},"institutions":[{"id":"https://openalex.org/I99165933","display_name":"University of Gujrat","ror":"https://ror.org/01xe5fb92","country_code":"PK","type":"education","lineage":["https://openalex.org/I99165933"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Z. Ul. Qayyum","raw_affiliation_strings":["Department of Computer Science, University of Gujrat, Jalalpur Jattan Road, 50700, Gujrat, Punjab, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Gujrat, Jalalpur Jattan Road, 50700, Gujrat, Punjab, Pakistan","institution_ids":["https://openalex.org/I99165933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047199689","display_name":"Muhammad Safyan","orcid":null},"institutions":[{"id":"https://openalex.org/I43879129","display_name":"Government College University, Lahore","ror":"https://ror.org/040gec961","country_code":"PK","type":"education","lineage":["https://openalex.org/I43879129"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"M. Safyan","raw_affiliation_strings":["Department of Computing, GC University Lahore, Katchery Rd, Anarkali Bazaar, 54000, Lahore, Punjab, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computing, GC University Lahore, Katchery Rd, Anarkali Bazaar, 54000, Lahore, Punjab, Pakistan","institution_ids":["https://openalex.org/I43879129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074431197","display_name":"Muddesar Iqbal","orcid":"https://orcid.org/0000-0002-8438-6726"},"institutions":[{"id":"https://openalex.org/I28257850","display_name":"London South Bank University","ror":"https://ror.org/02vwnat91","country_code":"GB","type":"education","lineage":["https://openalex.org/I28257850"]},{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"M. Iqbal","raw_affiliation_strings":["School of Computer Science and Electronic Engineering University of Essex Wivenhoe Park,\nUniversity of Essex, CO4 3SQ, Colchester, England","School of Engineering, London South Bank University, 103 Borough Rd, SE1 0AA, London, England"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering University of Essex Wivenhoe Park,\nUniversity of Essex, CO4 3SQ, Colchester, England","institution_ids":["https://openalex.org/I110002522"]},{"raw_affiliation_string":"School of Engineering, London South Bank University, 103 Borough Rd, SE1 0AA, London, England","institution_ids":["https://openalex.org/I28257850"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052423409","display_name":"Yasir Mahmood","orcid":"https://orcid.org/0000-0003-1578-5229"},"institutions":[{"id":"https://openalex.org/I99165933","display_name":"University of Gujrat","ror":"https://ror.org/01xe5fb92","country_code":"PK","type":"education","lineage":["https://openalex.org/I99165933"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Y. Mahmood","raw_affiliation_strings":["Department of Computer Science, University of Gujrat, Jalalpur Jattan Road, 50700, Gujrat, Punjab, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Gujrat, Jalalpur Jattan Road, 50700, Gujrat, Punjab, Pakistan","institution_ids":["https://openalex.org/I99165933"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5042109913","https://openalex.org/A5047199689","https://openalex.org/A5074431197"],"corresponding_institution_ids":["https://openalex.org/I110002522","https://openalex.org/I28257850","https://openalex.org/I43879129","https://openalex.org/I99165933"],"apc_list":null,"apc_paid":null,"fwci":0.4976,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.62317417,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"45","issue":"8","first_page":"581","last_page":"589"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11675","display_name":"Open Source Software Innovations","score":0.9375,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7322942614555359},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6975491642951965},{"id":"https://openalex.org/keywords/plagiarism-detection","display_name":"Plagiarism detection","score":0.629896879196167},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5996547937393188},{"id":"https://openalex.org/keywords/clustering-coefficient","display_name":"Clustering coefficient","score":0.5639629364013672},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.5419877171516418},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5365502834320068},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.434389591217041},{"id":"https://openalex.org/keywords/birthmark","display_name":"Birthmark","score":0.4187934994697571},{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.41769731044769287},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3461759686470032},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.308890163898468},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2448156476020813},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.21603626012802124},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2077259123325348}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7322942614555359},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6975491642951965},{"id":"https://openalex.org/C2780907237","wikidata":"https://www.wikidata.org/wiki/Q2986238","display_name":"Plagiarism detection","level":2,"score":0.629896879196167},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5996547937393188},{"id":"https://openalex.org/C22047676","wikidata":"https://www.wikidata.org/wiki/Q898680","display_name":"Clustering coefficient","level":3,"score":0.5639629364013672},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.5419877171516418},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5365502834320068},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.434389591217041},{"id":"https://openalex.org/C2776826570","wikidata":"https://www.wikidata.org/wiki/Q3513591","display_name":"Birthmark","level":2,"score":0.4187934994697571},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.41769731044769287},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3461759686470032},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.308890163898468},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2448156476020813},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.21603626012802124},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2077259123325348},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1134/s0361768819080152","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768819080152","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"},{"id":"pmh:oai:openresearch.lsbu.ac.uk:888q0","is_oa":true,"landing_page_url":"https://doi.org/10.1134/S0361768819080152","pdf_url":null,"source":{"id":"https://openalex.org/S4306401135","display_name":"Research Open (London South Bank University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28257850","host_organization_name":"London South Bank University","host_organization_lineage":["https://openalex.org/I28257850"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"journal-article"}],"best_oa_location":{"id":"pmh:oai:openresearch.lsbu.ac.uk:888q0","is_oa":true,"landing_page_url":"https://doi.org/10.1134/S0361768819080152","pdf_url":null,"source":{"id":"https://openalex.org/S4306401135","display_name":"Research Open (London South Bank University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28257850","host_organization_name":"London South Bank University","host_organization_lineage":["https://openalex.org/I28257850"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W576037686","https://openalex.org/W1538670717","https://openalex.org/W1863385414","https://openalex.org/W1983523456","https://openalex.org/W1995739251","https://openalex.org/W2002992278","https://openalex.org/W2003391098","https://openalex.org/W2017102965","https://openalex.org/W2022277814","https://openalex.org/W2038159719","https://openalex.org/W2054360027","https://openalex.org/W2079558195","https://openalex.org/W2084939909","https://openalex.org/W2096196901","https://openalex.org/W2101830524","https://openalex.org/W2117144696","https://openalex.org/W2127020518","https://openalex.org/W2146567535","https://openalex.org/W2146916812","https://openalex.org/W2165069015","https://openalex.org/W2172001940","https://openalex.org/W2317869823","https://openalex.org/W2333150306","https://openalex.org/W2346996779","https://openalex.org/W2408122673","https://openalex.org/W2412361571","https://openalex.org/W2532550198","https://openalex.org/W2532842235","https://openalex.org/W2597697275","https://openalex.org/W2791541601","https://openalex.org/W3151976924","https://openalex.org/W4285719527","https://openalex.org/W6633816946"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W1531601525","https://openalex.org/W2058699798","https://openalex.org/W2150180300","https://openalex.org/W4245099902","https://openalex.org/W2025715015"],"abstract_inverted_index":{"The":[0,61,89,114,145],"emergence":[1],"of":[2,33,38,56,64,107,111,122,138,148,162,170],"software":[3,17,23,34,90,142],"artifacts":[4],"greatly":[5],"emphasizes":[6],"the":[7,95,105,136],"need":[8],"for":[9,22,104,133,157,166],"protecting":[10],"intellectual":[11],"property":[12],"rights":[13],"(IPR)":[14],"hampered":[15],"by":[16,35,93],"piracy":[18,24],"requiring":[19],"effective":[20],"measures":[21],"control.":[25],"Software":[26],"birthmarking":[27,43],"targets":[28],"to":[29],"counter":[30],"ownership":[31,143],"theft":[32],"identifying":[36],"similarity":[37,108],"their":[39,68,77],"origins.":[40],"A":[41],"novice":[42],"approach":[44,140,150],"has":[45,117],"been":[46,74,118],"proposed":[47,115,139,149],"in":[48],"this":[49],"paper":[50],"that":[51],"is":[52],"based":[53],"on":[54],"hybrid":[55],"text-mining":[57],"and":[58,67,82,130,160,165,182],"graph-mining":[59],"techniques.":[60],"code":[62,80,128],"elements":[63,72],"a":[65],"program":[66,163,180],"relations":[69,161],"with":[70,151],"other":[71],"have":[73],"identified":[75],"through":[76],"properties":[78,98,159],"(i.e.,":[79],"constructs)":[81],"transformed":[83],"into":[84],"Graph":[85],"Manipulation":[86],"Language":[87],"(GML).":[88],"birthmarks":[91],"generated":[92],"exploiting":[94],"graph":[96,171],"theoretic":[97],"(through":[99],"clustering":[100],"coefficient)":[101],"are":[102],"used":[103],"classifications":[106],"or":[109],"dissimilarity":[110],"two":[112],"programs.":[113],"technique":[116],"evaluated":[119],"over":[120],"metrics":[121],"credibility,":[123],"resilience,":[124],"method":[125],"theft,":[126],"modified":[127],"detection":[129,132],"self-copy":[131],"programs":[134],"asserting":[135],"effectiveness":[137],"against":[141],"theft.":[144],"comparative":[146],"analysis":[147],"contemporary":[152],"ones":[153],"shows":[154],"better":[155],"results":[156],"having":[158],"nodes":[164],"employing":[167],"dynamic":[168],"techniques":[169],"mining":[172],"without":[173],"adding":[174],"any":[175],"overhead":[176],"(such":[177],"as":[178],"increased":[179],"size":[181],"processing":[183],"cost).":[184]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
