Acknowledgement
이 논문은 한국콘텐츠진흥원의 2024년도 SW저작권 생태계 조성 기술개발사업(과제명 : 클라우드 서비스 활용 구축 형태별 대규모 소프트웨어 라이선스검증 기술개발, 과제번호: RS-2023-00224818, 기여율: 50%)과 과학기술정보통신부의 재원으로 한국연구재단(No. 2022R1A2B5B01002490)의 지원을 받아 수행됨.
References
- S.-R. Son and Y. Kang, "Business models proposal for Korean open source GIS software companies," Journal of Cadastre & Land InformatiX, Vol.48, No.1, pp.187-199, https://koreascience.kr/article/JAKO201821142175225.page, Jun, 2018. https://doi.org/10.22640/LXSIRI.2018.48.1.187
- R. Gurikar and G. S. Gururaj, "Use of open source software in indian institutional digital repositories: A study," Library Philosophy and Practice (e-journal), 2021.
- K.-H. Lee and J.-P. Park, "A software vulnerability analysis system using learning for source code weakness history," Korea Academia-Industrial Cooperation Society, Vol.18, No.11, pp.46-52, 2017.
- Y. Agarwal, "Apache Log4j logging framework and its vulnerability," in Metropolia University of Applied Sciences Master of Engineering Information Technology Master's Thesis, Mar. 2022.
- D.-G. Lee and Y.-S. Seo, "A study on the identification of open source license compatibility violations" KIPS Transactions on Software and Data Engineering, Vol.7, No.12, pp.451-460, 2018. https://doi.org/10.3745/KTSDE.2018.7.12.451
- H. Schoettle, "Open source license compliance-why and how?" Computer, Vol.52, No.8, pp.63-67, 2019. DOI: https://doi.org/10.1109/MC.2019.291569
- D. Bellamkonda "Software engineering tools for secure application development," in Cluminating Projects in Information Assurance, May. 2023.
- S.-W. Kim and K.-H. Son, "SBOM trends for OSS traceability," The Korea Institute of Information Security and Cryptology, Vol.32, No.5, pp.53-66, 2022.
- T. Tuunanen, J. Koskinen, and T. Karkkainen, "Automated software license analysis," Automated Software Engineering, Vol.16, pp.455-490, 2009. https://doi.org/10.1007/s10515-009-0054-z
- C. Ragkhitwetsagul, J. Krinke, and D. Clark "Similarity of source code in the presence of pervasive modifications," in 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2016.
- C.-H. Huang, J. Yin, and F. Hou, "A text similarity measurement combining word semantic information with TF-IDF method," Chinese Journal of Computers, No.5, pp.856-864, 2011.
- F. Rahutomo, T. Kitasuka, and M. Aritsugi, "Semantic cosine similarity," in The 7th International Student Conference on Advanced Science and Technology ICAST 2012, At: Seoul, South Korea, Oct. 2012.
- Z. Pauzi and A. Capiluppi, "Text similarity between concepts extracted from source code and documentation," in Intelligent Data Engineering and Automated Learning - IDEAL 2020, pp.124-135, Oct. 2020.
- S. Schleimer, D. S. Wilkerson, and A. Aiken, "Winnowing: Local algorithms for document fingerprinting," In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 76-85, Jun. 2003.
- K.-H. Kim, S. C. Yoon, S.-H. Kim, and I.-Y. Lee, "A study on platform for OSS similarity and license analysis," in Proceedings of the Annual Conference of Korea Information Processing Society Conference (KIPS) 2023, Vol.30, No.2, pp.317-318, Nov. 2023.