2017
DOI: 10.1088/1742-6596/855/1/012031
|View full text |Cite
|
Sign up to set email alerts
|

Software Piracy Detection Model Using Ant Colony Optimization Algorithm

Abstract: Abstract. Internet enables information to be accessible anytime and anywhere. This scenario creates an environment whereby information can be easily copied. Easy access to the internet is one of the factors which contribute towards piracy in Malaysia as well as the rest of the world. According to a survey conducted by Compliance Gap BSA Global Software Survey in 2013 on software piracy, found out that 43 percent of the software installed on PCs around the world was not properly licensed, the commercial value o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…On the other hand, in the active identification of infringing sites, twenty-one [25,[28][29][30][31][32][33][34][35][64][65][66][67][68][69][70][71][72][73][74][75] significant research contributions were compiled. Among these, three [65][66][67] engage in non-technical actions such as manual search and reporting, contributing to the legal takedown of offending sites.…”
Section: Taxonomy For the Protection And Detection Of Infringing Mult...mentioning
confidence: 99%
See 3 more Smart Citations
“…On the other hand, in the active identification of infringing sites, twenty-one [25,[28][29][30][31][32][33][34][35][64][65][66][67][68][69][70][71][72][73][74][75] significant research contributions were compiled. Among these, three [65][66][67] engage in non-technical actions such as manual search and reporting, contributing to the legal takedown of offending sites.…”
Section: Taxonomy For the Protection And Detection Of Infringing Mult...mentioning
confidence: 99%
“…Six projects [28,29,[68][69][70][71] follow a technical route, involving surveillance and cyber patrolling within the IoE. Regrettably, only twelve initiatives [28][29][30][31][32][33][34][35][72][73][74][75] implement one or more AI/ML techniques for identifying infringing content on the IoE, and of these, only eight [28][29][30][31][32][33][34][35] are considered closely related studies. Notably, a single article [25] stands out for its purely technical approach to the defensive and active aspects.…”
Section: Taxonomy For the Protection And Detection Of Infringing Mult...mentioning
confidence: 99%
See 2 more Smart Citations
“…A great deal of research relates to detection of pirated digital content and product on the internet such as movies, audios, software, and games [39,40,41,42,43,44,45,46,47,48]. However, fewer research exists on the detection of piracy websites that illegally copy and distribute such contents without the permission of the copyright owner.…”
Section: • Piracy Websitementioning
confidence: 99%