Works matching DE "SOFTWARE protection"
Results: 83
A Relook at Sui Generis Software Protection Through the Prism of Multi- Licensing.
- Published in:
- Journal of World Intellectual Property, 2013, v. 16, n. 1/2, p. 87, doi. 10.1002/jwip.12009
- By:
- Publication type:
- Article
Semantics-based software watermarking by abstract interpretation.
- Published in:
- Mathematical Structures in Computer Science, 2019, v. 29, n. 2, p. 339, doi. 10.1017/S0960129518000038
- By:
- Publication type:
- Article
Modern obfuscation methods for secure coding.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 32, doi. 10.18372/2225-5036.22.10451
- By:
- Publication type:
- Article
Research of Software Complexity Metrics with Security Indicator.
- Published in:
- Journal of Donghua University (English Edition), 2011, v. 28, n. 5, p. 460
- By:
- Publication type:
- Article
PROTECTION AGAINST SOFTWARE PIRACY: A STUDY OF TECHNOLOGY ADOPTION FOR THE ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS.
- Published in:
- Economics of Innovation & New Technology, 2000, v. 9, n. 1, p. 25, doi. 10.1080/10438590000000002
- By:
- Publication type:
- Article
1993--A bad year for software pirates.
- Published in:
- Internal Auditor, 1994, v. 51, n. 2, p. 8
- By:
- Publication type:
- Article
New SPA research targets software pirates.
- Published in:
- Internal Auditor, 1993, v. 50, n. 5, p. 11
- By:
- Publication type:
- Article
Stolen software seizures, BSA resolution herald software...
- Published in:
- CD-ROM Professional, 1996, v. 9, n. 2, p. 18
- Publication type:
- Article
Research on Safety and Compliance of a New Lower Limb Rehabilitation Robot.
- Published in:
- Journal of Healthcare Engineering, 2017, p. 1, doi. 10.1155/2017/1523068
- By:
- Publication type:
- Article
DON'T STOP THE MUSIC: NO STRICT PRODUCTS LIABILITY FOR EMBEDDED SOFTWARE.
- Published in:
- University of Florida Journal of Law & Public Policy, 2008, v. 19, n. 1, p. 125
- By:
- Publication type:
- Article
Software Preservation: An Introduction to Issues and Challenges.
- Published in:
- Technical Services Quarterly, 2019, v. 36, n. 2, p. 177, doi. 10.1080/07317131.2019.1584983
- By:
- Publication type:
- Article
DANGEROUS LIAISONS--SOFTWARE COMBINATIONS AS DERIVATIVE WORKS? DISTRIBUTION, INSTALLATION, AND EXECUTION OF LINKED PROGRAMS UNDER COPYRIGHT LAW, COMMERCIAL LICENSES, AND THE GPL.
- Published in:
- Berkeley Technology Law Journal, 2006, v. 21, n. 4, p. 1421
- By:
- Publication type:
- Article
SONY-BMG COPY PROTECTION ROOTKIT.
- Published in:
- Berkeley Technology Law Journal, 2006, v. 21, n. 1, p. 551
- Publication type:
- Article
Study on Preventive Software Rejuvenation Policy for Two Kinds of Bugs.
- Published in:
- Journal of Systems Science & Information, 2009, v. 7, n. 2, p. 103
- By:
- Publication type:
- Article
Watermarking by numbers.
- Published in:
- Nature, 1996, v. 384, n. 6609, p. 514, doi. 10.1038/384514a0
- By:
- Publication type:
- Article
A New Model for Secure Software Development.
- Published in:
- International Journal of Intelligent Information Technology Application, 2009, v. 2, n. 3, p. 136
- By:
- Publication type:
- Article
The First of Many Steps: The EU Unitary Patent, Software, and What the United Kingdom Should Do Next.
- Published in:
- Pacific McGeorge Global Business & Development Law Journal, 2013, v. 26, n. 1, p. 259
- By:
- Publication type:
- Article
Weak Password Security: An Empirical Study.
- Published in:
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 1, p. 45, doi. 10.1080/10658980701824432
- By:
- Publication type:
- Article
Anakam Software Meets Federal Government Requirements.
- Published in:
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 32
- Publication type:
- Article
USAGE OF UNAUTHORIZED SOFTWARE IN TAIWAN.
- Published in:
- Social Behavior & Personality: an international journal, 2008, v. 36, n. 1, p. 1, doi. 10.2224/sbp.2008.36.1.1
- By:
- Publication type:
- Article
THE LAW AND ECONOMICS OF SOFTWARE SECURITY.
- Published in:
- Harvard Journal of Law & Public Policy, 2006, v. 30, n. 1, p. 283
- By:
- Publication type:
- Article
A framework for secure execution of software.
- Published in:
- International Journal of Information Security, 2004, v. 3, n. 2, p. 99, doi. 10.1007/s10207-004-0048-6
- By:
- Publication type:
- Article
Intellectual Property Protection for Computer Programs: Developments, Challenges and Pressure for Change.
- Published in:
- Nordic Journal of Commercial Law, 2013, n. 2, p. 1
- By:
- Publication type:
- Article
An Automatic Test Case Generator for Evaluating Implementation of Access Control Policies.
- Published in:
- ISeCure, 2017, v. 9, n. 1, p. 73
- By:
- Publication type:
- Article
Dwarf Frankenstein is Still in Your Memory: Tiny Code Reuse Attacks.
- Published in:
- ISeCure, 2017, v. 9, n. 1, p. 53
- By:
- Publication type:
- Article
Side Channel Parameter Characteristics of Code Injection Attacks.
- Published in:
- ISeCure, 2017, v. 9, n. 1, p. 17
- By:
- Publication type:
- Article
A defect prediction method for software versioning.
- Published in:
- Software Quality Journal, 2008, v. 16, n. 4, p. 543, doi. 10.1007/s11219-008-9053-8
- By:
- Publication type:
- Article
Memory access integrity: detecting fine-grained memory access errors in binary code.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0035-x
- By:
- Publication type:
- Article
The relationship between copyright software protection and piracy: Evidence from europe.
- Published in:
- European Journal of Law & Economics, 2006, v. 21, n. 1, p. 29, doi. 10.1007/s10657-006-5670-5
- By:
- Publication type:
- Article
CONTENT ANALYSIS: AN APPROACH TO THE COMPUTER SOFTWARE PROTECTION CONTROVERSY.
- Published in:
- American Business Law Journal, 1979, v. 17, n. 2, p. 175, doi. 10.1111/j.1744-1714.1979.tb00575.x
- By:
- Publication type:
- Article
A Model to Quantify the Return on Investment of Information Assurance.
- Published in:
- DISAM Journal of International Security Assistance Management, 2007, v. 29, n. 3, p. 125
- By:
- Publication type:
- Article
Intellectual Property Paradoxes in Developing Countries: The Case of Software IP Protection in Iran.
- Published in:
- Journal of Intellectual Property Rights, 2014, v. 19, n. 1, p. 33
- By:
- Publication type:
- Article
Open Source Software Paradigm and Intellectual Property Rights.
- Published in:
- Journal of Intellectual Property Rights, 2012, v. 17, n. 6, p. 511
- By:
- Publication type:
- Article
Software Protection: Copyrightability vs Patentability?
- Published in:
- Journal of Intellectual Property Rights, 2012, v. 17, n. 2, p. 160
- By:
- Publication type:
- Article
Australian Recommendations on Computer Software Protection.
- Published in:
- Computer Journal, 1996, v. 39, n. 7, p. 566, doi. 10.1093/comjnl/39.7.566
- By:
- Publication type:
- Article
Software Wars: The Patent Menace.
- Published in:
- New York Law School Law Review, 2010, v. 55, n. 1, p. 295
- By:
- Publication type:
- Article
Parameters for Software Piracy Research.
- Published in:
- Information Society, 2008, v. 24, n. 4, p. 199, doi. 10.1080/01972240802189468
- By:
- Publication type:
- Article
Secure and Efficient Code Encryption Scheme Based on Indexed Table.
- Published in:
- ETRI Journal, 2011, v. 33, n. 1, p. 60, doi. 10.4218/etrij.11.0110.0056
- By:
- Publication type:
- Article
PROTECȚIA UNOR CREAȚII INTELECTUALE ÎMPOTRIVA PIRATERIEI PE INTERNET.
- Published in:
- Romanian Journal of Intellectual Property Law / Revista Română de Dreptul Proprietăţii Intelectuale, 2016, n. 2, p. 41
- By:
- Publication type:
- Article
O ABORDARE JURIDICĂ A LICENȚELOR COPYLEFT.
- Published in:
- Romanian Journal of Intellectual Property Law / Revista Română de Dreptul Proprietăţii Intelectuale, 2015, n. 2, p. 198
- By:
- Publication type:
- Article
DATA PROTECTION IN MICROCOMPUTER SYSTEMS AND NETWORKS.
- Published in:
- Acta Technica Corviniensis - Bulletin of Engineering, 2014, v. 7, n. 2, p. 137
- By:
- Publication type:
- Article
VIRTUAL PROPERTY, REAL CONCERNS.
- Published in:
- Akron Intellectual Property Journal, 2010, v. 4, n. 1, p. 35
- By:
- Publication type:
- Article
Ezproxy for Electronic Resource Librarians: Conference Report.
- Published in:
- 2014
- By:
- Publication type:
- Proceeding
Assessment of Dongle-based Software Copy Protection Combined with Additional Protection Methods.
- Published in:
- Electronics & Electrical Engineering, 2011, n. 112, p. 111
- By:
- Publication type:
- Article
Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 8, p. 1980
- By:
- Publication type:
- Article
A New Authentication Scheme for the Protection of FPGA Based IP Designs.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 6, p. 1445
- By:
- Publication type:
- Article
HOW TO FIGHT DIGITAL COLONIALISM.
- Published in:
- Boston Review, 2022, p. 139
- By:
- Publication type:
- Article
Gathering the Foam: Are Business Method Patents a Deterrent to Software Innovation and Commercialization?
- Published in:
- International Review of Law, Computers & Technology, 2003, v. 17, n. 2, p. 127, doi. 10.1080/1360086032000122538
- By:
- Publication type:
- Article
Software theft among the top 1000 organizations and their...
- Published in:
- International Review of Law, Computers & Technology, 1996, v. 10, n. 2, p. 317, doi. 10.1080/13600869.1996.9966451
- By:
- Publication type:
- Article
Act Quickly to Avoid Losing Patents.
- Published in:
- IEEE Software, 1999, v. 16, n. 2, p. 33, doi. 10.1109/52.754050
- By:
- Publication type:
- Article