Research Article
Software Birthmark Usability for Source Code Transformation Using Machine Learning Algorithms
| S. no. | Ref. | Approaches of software birthmark | 1 | [8] | Birthmark-based approach for intellectual software asset management | 2 | [9] | DKISB | 3 | [10] | Instruction-words based software birthmark | 4 | [11] | JSBiRTH | 5 | [29] | API call structure | 6 | [15] | CVFV, SMC, IS, and UC | 7 | [18] | Detecting software theft via whole program path birthmarks | 8 | [30] | Birthmark-based android application filtering | 9 | [31] | System call dependence graph | 10 | [24] | Dynamic k-gram-based software birthmark | 11 | [32] | k-gram-based software birthmarks | 12 | [33] | Dynamic key instruction sequences | 13 | [23] | Features-based software birthmark | 14 | [34] | Method-based static software birthmarks | 15 | [35] | CHI-based instruction-words based software birthmark | 16 | [36] | Thread-aware software birthmarks | 17 | [37] | System call-based birthmarks |
|
|