Modelling Features-Based Birthmarks for Security of End-to-End Communication System

<p>Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Meilian Li (733635) (author)
مؤلفون آخرون: Habib Ullah Khan (14570648) (author), Sara Shahzad (14570660) (author), Rohul Amin (10927923) (author)
منشور في: 2020
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513563317501952
author Meilian Li (733635)
author2 Habib Ullah Khan (14570648)
Sara Shahzad (14570660)
Rohul Amin (10927923)
author2_role author
author
author
author_facet Meilian Li (733635)
Habib Ullah Khan (14570648)
Sara Shahzad (14570660)
Rohul Amin (10927923)
author_role author
dc.creator.none.fl_str_mv Meilian Li (733635)
Habib Ullah Khan (14570648)
Sara Shahzad (14570660)
Rohul Amin (10927923)
dc.date.none.fl_str_mv 2020-06-29T21:00:00Z
dc.identifier.none.fl_str_mv 10.1155/2020/8852124
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Modelling_Features-Based_Birthmarks_for_Security_of_End-to-End_Communication_System/22014734
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Engineering
Communications engineering
Information and computing sciences
Cybersecurity and privacy
Computer Networks and Communications
Information Systems
Software piracy detection
Software theft prevention
Cybersecurity
dc.title.none.fl_str_mv Modelling Features-Based Birthmarks for Security of End-to-End Communication System
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p>Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based software birthmark joint with the practice of software birthmark estimation together can deliver a right and influential method for detecting software piracy and the amount of piracy done by a software. This can also guide developers in improving security of end-to-end communication system. Modern day software industry and systems are in demand to have an unbiased method for comparing the features-based birthmark of software competently, and more concretely for the detecting software piracy and assessing the security of end-to-end communication systems. In this paper, we proposed a mathematical model, which is based on a differential system, to present feature-based software birthmark. The model presented in this paper provides an exclusive way for the features-based birthmark of software and then can be used for comparing birthmark and assessing security of end-to-end communication systems. The results of this method show that the proposed model is efficient in terms of effectiveness and correctness for the features-based software birthmark comparison and security assessment purposes. </p> <h2>Other information </h2> <p>Published in: Security and Communication Networks<br> License: <a href="http://creativecommons.org/licenses/by/4.0" target="_blank">http://creativecommons.org/licenses/by/4.0</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.1155/2020/8852124" target="_blank">http://dx.doi.org/10.1155/2020/8852124</a> </p>
eu_rights_str_mv openAccess
id Manara2_52194e726ffda33500de322e2ea96496
identifier_str_mv 10.1155/2020/8852124
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/22014734
publishDate 2020
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Modelling Features-Based Birthmarks for Security of End-to-End Communication SystemMeilian Li (733635)Habib Ullah Khan (14570648)Sara Shahzad (14570660)Rohul Amin (10927923)EngineeringCommunications engineeringInformation and computing sciencesCybersecurity and privacyComputer Networks and CommunicationsInformation SystemsSoftware piracy detectionSoftware theft preventionCybersecurity<p>Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based software birthmark joint with the practice of software birthmark estimation together can deliver a right and influential method for detecting software piracy and the amount of piracy done by a software. This can also guide developers in improving security of end-to-end communication system. Modern day software industry and systems are in demand to have an unbiased method for comparing the features-based birthmark of software competently, and more concretely for the detecting software piracy and assessing the security of end-to-end communication systems. In this paper, we proposed a mathematical model, which is based on a differential system, to present feature-based software birthmark. The model presented in this paper provides an exclusive way for the features-based birthmark of software and then can be used for comparing birthmark and assessing security of end-to-end communication systems. The results of this method show that the proposed model is efficient in terms of effectiveness and correctness for the features-based software birthmark comparison and security assessment purposes. </p> <h2>Other information </h2> <p>Published in: Security and Communication Networks<br> License: <a href="http://creativecommons.org/licenses/by/4.0" target="_blank">http://creativecommons.org/licenses/by/4.0</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.1155/2020/8852124" target="_blank">http://dx.doi.org/10.1155/2020/8852124</a> </p>2020-06-29T21:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1155/2020/8852124https://figshare.com/articles/journal_contribution/Modelling_Features-Based_Birthmarks_for_Security_of_End-to-End_Communication_System/22014734CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/220147342020-06-29T21:00:00Z
spellingShingle Modelling Features-Based Birthmarks for Security of End-to-End Communication System
Meilian Li (733635)
Engineering
Communications engineering
Information and computing sciences
Cybersecurity and privacy
Computer Networks and Communications
Information Systems
Software piracy detection
Software theft prevention
Cybersecurity
status_str publishedVersion
title Modelling Features-Based Birthmarks for Security of End-to-End Communication System
title_full Modelling Features-Based Birthmarks for Security of End-to-End Communication System
title_fullStr Modelling Features-Based Birthmarks for Security of End-to-End Communication System
title_full_unstemmed Modelling Features-Based Birthmarks for Security of End-to-End Communication System
title_short Modelling Features-Based Birthmarks for Security of End-to-End Communication System
title_sort Modelling Features-Based Birthmarks for Security of End-to-End Communication System
topic Engineering
Communications engineering
Information and computing sciences
Cybersecurity and privacy
Computer Networks and Communications
Information Systems
Software piracy detection
Software theft prevention
Cybersecurity