Modelling Features-Based Birthmarks for Security of End-to-End Communication System
<p>Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , , |
| منشور في: |
2020
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513563317501952 |
|---|---|
| author | Meilian Li (733635) |
| author2 | Habib Ullah Khan (14570648) Sara Shahzad (14570660) Rohul Amin (10927923) |
| author2_role | author author author |
| author_facet | Meilian Li (733635) Habib Ullah Khan (14570648) Sara Shahzad (14570660) Rohul Amin (10927923) |
| author_role | author |
| dc.creator.none.fl_str_mv | Meilian Li (733635) Habib Ullah Khan (14570648) Sara Shahzad (14570660) Rohul Amin (10927923) |
| dc.date.none.fl_str_mv | 2020-06-29T21:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1155/2020/8852124 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/Modelling_Features-Based_Birthmarks_for_Security_of_End-to-End_Communication_System/22014734 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Engineering Communications engineering Information and computing sciences Cybersecurity and privacy Computer Networks and Communications Information Systems Software piracy detection Software theft prevention Cybersecurity |
| dc.title.none.fl_str_mv | Modelling Features-Based Birthmarks for Security of End-to-End Communication System |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p>Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based software birthmark joint with the practice of software birthmark estimation together can deliver a right and influential method for detecting software piracy and the amount of piracy done by a software. This can also guide developers in improving security of end-to-end communication system. Modern day software industry and systems are in demand to have an unbiased method for comparing the features-based birthmark of software competently, and more concretely for the detecting software piracy and assessing the security of end-to-end communication systems. In this paper, we proposed a mathematical model, which is based on a differential system, to present feature-based software birthmark. The model presented in this paper provides an exclusive way for the features-based birthmark of software and then can be used for comparing birthmark and assessing security of end-to-end communication systems. The results of this method show that the proposed model is efficient in terms of effectiveness and correctness for the features-based software birthmark comparison and security assessment purposes. </p> <h2>Other information </h2> <p>Published in: Security and Communication Networks<br> License: <a href="http://creativecommons.org/licenses/by/4.0" target="_blank">http://creativecommons.org/licenses/by/4.0</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.1155/2020/8852124" target="_blank">http://dx.doi.org/10.1155/2020/8852124</a> </p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_52194e726ffda33500de322e2ea96496 |
| identifier_str_mv | 10.1155/2020/8852124 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/22014734 |
| publishDate | 2020 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Modelling Features-Based Birthmarks for Security of End-to-End Communication SystemMeilian Li (733635)Habib Ullah Khan (14570648)Sara Shahzad (14570660)Rohul Amin (10927923)EngineeringCommunications engineeringInformation and computing sciencesCybersecurity and privacyComputer Networks and CommunicationsInformation SystemsSoftware piracy detectionSoftware theft preventionCybersecurity<p>Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research on feature-based software birthmark shows that using the feature-based software birthmark joint with the practice of software birthmark estimation together can deliver a right and influential method for detecting software piracy and the amount of piracy done by a software. This can also guide developers in improving security of end-to-end communication system. Modern day software industry and systems are in demand to have an unbiased method for comparing the features-based birthmark of software competently, and more concretely for the detecting software piracy and assessing the security of end-to-end communication systems. In this paper, we proposed a mathematical model, which is based on a differential system, to present feature-based software birthmark. The model presented in this paper provides an exclusive way for the features-based birthmark of software and then can be used for comparing birthmark and assessing security of end-to-end communication systems. The results of this method show that the proposed model is efficient in terms of effectiveness and correctness for the features-based software birthmark comparison and security assessment purposes. </p> <h2>Other information </h2> <p>Published in: Security and Communication Networks<br> License: <a href="http://creativecommons.org/licenses/by/4.0" target="_blank">http://creativecommons.org/licenses/by/4.0</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.1155/2020/8852124" target="_blank">http://dx.doi.org/10.1155/2020/8852124</a> </p>2020-06-29T21:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1155/2020/8852124https://figshare.com/articles/journal_contribution/Modelling_Features-Based_Birthmarks_for_Security_of_End-to-End_Communication_System/22014734CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/220147342020-06-29T21:00:00Z |
| spellingShingle | Modelling Features-Based Birthmarks for Security of End-to-End Communication System Meilian Li (733635) Engineering Communications engineering Information and computing sciences Cybersecurity and privacy Computer Networks and Communications Information Systems Software piracy detection Software theft prevention Cybersecurity |
| status_str | publishedVersion |
| title | Modelling Features-Based Birthmarks for Security of End-to-End Communication System |
| title_full | Modelling Features-Based Birthmarks for Security of End-to-End Communication System |
| title_fullStr | Modelling Features-Based Birthmarks for Security of End-to-End Communication System |
| title_full_unstemmed | Modelling Features-Based Birthmarks for Security of End-to-End Communication System |
| title_short | Modelling Features-Based Birthmarks for Security of End-to-End Communication System |
| title_sort | Modelling Features-Based Birthmarks for Security of End-to-End Communication System |
| topic | Engineering Communications engineering Information and computing sciences Cybersecurity and privacy Computer Networks and Communications Information Systems Software piracy detection Software theft prevention Cybersecurity |