[vc_empty_space][vc_empty_space]
Detecting plagiarism in cross-platform mobile applications: Case study: Game application similarity in Symbian platform and Android platform
Pramono Y.W.T.a, Suhardia
a School of Electrical Engineering and Informatics, Institut Teknologi Bandung (ITB), Bandung, Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2014 IEEE.The development of mobile platform applications is increasing significantly since the rapid growth of mobile operating system and the high ability of mobile computing performance. Many mobile application developers nowadays work on a project to be implemented in a different mobile OS environment. The cross-platform applications are now becoming one of the advantages to be achieved by developers to sell their products to mobile platform users. The ease of access to the applications through the app-market leads rogue developers to try an illegal application platform-porting and illegal reuse of source codes that leads to plagiarism and infringement of intellectual property rights. In this paper, we discuss on how to analyze two different mobile application platforms that suspected as illegal platform-porting with a case study in mobile gaming application on the Symbian OS environment and the Android OS environment. The result shows that even two applications deployed on a different mobile OS environment by different developer, based on our study case investigation using lexical and structured approach, we found that infringes on intellectual property rights does exist.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Digital forensic,Mobile applications,plagiarism,Software clones,Source code similarities[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]digital forensic,mobile application,plagiarism,software clone,source code similarity[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITSI.2014.7048257[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]