Works matching DE "SOFTWARE protection"
Results: 80
PROTECȚIA UNOR CREAȚII INTELECTUALE ÎMPOTRIVA PIRATERIEI PE INTERNET.
- Published in:
- Romanian Journal of Intellectual Property Law / Revista Română de Dreptul Proprietăţii Intelectuale, 2016, n. 2, p. 41
- By:
- Publication type:
- Article
O ABORDARE JURIDICĂ A LICENȚELOR COPYLEFT.
- Published in:
- Romanian Journal of Intellectual Property Law / Revista Română de Dreptul Proprietăţii Intelectuale, 2015, n. 2, p. 198
- By:
- Publication type:
- Article
Software theft: A $4.5 billion headache.
- Published in:
- Business Forum, 1992, v. 17, n. 2, p. 10
- By:
- Publication type:
- Article
Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 8, p. 1980
- By:
- Publication type:
- Article
A New Authentication Scheme for the Protection of FPGA Based IP Designs.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 6, p. 1445
- By:
- Publication type:
- Article
Applying Formal Methods to a Certifiably Secure Software System.
- Published in:
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 82, doi. 10.1109/TSE.2007.70772
- By:
- Publication type:
- Article
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation.
- Published in:
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 65, doi. 10.1109/TSE.2007.70748
- By:
- Publication type:
- Article
Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection.
- Published in:
- IEEE Transactions on Software Engineering, 2002, v. 28, n. 8, p. 735, doi. 10.1109/TSE.2002.1027797
- By:
- Publication type:
- Article
Stack and Queue Integrity on Hostile Platforms.
- Published in:
- IEEE Transactions on Software Engineering, 2002, v. 28, n. 1, p. 100, doi. 10.1109/32.979991
- By:
- Publication type:
- Article
Australian Recommendations on Computer Software Protection.
- Published in:
- Computer Journal, 1996, v. 39, n. 7, p. 566, doi. 10.1093/comjnl/39.7.566
- By:
- Publication type:
- Article
An Automatic Test Case Generator for Evaluating Implementation of Access Control Policies.
- Published in:
- ISeCure, 2017, v. 9, n. 1, p. 73
- By:
- Publication type:
- Article
Dwarf Frankenstein is Still in Your Memory: Tiny Code Reuse Attacks.
- Published in:
- ISeCure, 2017, v. 9, n. 1, p. 53
- By:
- Publication type:
- Article
Side Channel Parameter Characteristics of Code Injection Attacks.
- Published in:
- ISeCure, 2017, v. 9, n. 1, p. 17
- By:
- Publication type:
- Article
Cyberattacks: Why, What, Who and How.
- Published in:
- IT Professional, 2009, v. 11, n. 3, p. 14, doi. 10.1109/MITP.2009.46
- By:
- Publication type:
- Article
Assessment of Dongle-based Software Copy Protection Combined with Additional Protection Methods.
- Published in:
- Electronics & Electrical Engineering, 2011, n. 112, p. 111
- By:
- Publication type:
- Article
USAGE OF UNAUTHORIZED SOFTWARE IN TAIWAN.
- Published in:
- Social Behavior & Personality: an international journal, 2008, v. 36, n. 1, p. 1, doi. 10.2224/sbp.2008.36.1.1
- By:
- Publication type:
- Article
HOW TO FIGHT DIGITAL COLONIALISM.
- Published in:
- Boston Review, 2022, p. 139
- By:
- Publication type:
- Article
On Best-Possible Obfuscation.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 3, p. 480, doi. 10.1007/s00145-013-9151-z
- By:
- Publication type:
- Article
Modern obfuscation methods for secure coding.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 32, doi. 10.18372/2225-5036.22.10451
- By:
- Publication type:
- Article
VIRTUAL PROPERTY, REAL CONCERNS.
- Published in:
- Akron Intellectual Property Journal, 2010, v. 4, n. 1, p. 35
- By:
- Publication type:
- Article
A New Model for Secure Software Development.
- Published in:
- International Journal of Intelligent Information Technology Application, 2009, v. 2, n. 3, p. 136
- By:
- Publication type:
- Article
A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms.
- Published in:
- Journal of Medical Systems, 2002, v. 26, n. 3, p. 221, doi. 10.1023/A:1015062301029
- By:
- Publication type:
- Article
Secure and Efficient Code Encryption Scheme Based on Indexed Table.
- Published in:
- ETRI Journal, 2011, v. 33, n. 1, p. 60, doi. 10.4218/etrij.11.0110.0056
- By:
- Publication type:
- Article
Memory access integrity: detecting fine-grained memory access errors in binary code.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0035-x
- By:
- Publication type:
- Article
Software Piracy in Research: A Moral Analysis.
- Published in:
- Science & Engineering Ethics, 2015, v. 21, n. 4, p. 967, doi. 10.1007/s11948-014-9573-5
- By:
- Publication type:
- Article
Semantics-based software watermarking by abstract interpretation.
- Published in:
- Mathematical Structures in Computer Science, 2019, v. 29, n. 2, p. 339, doi. 10.1017/S0960129518000038
- By:
- Publication type:
- Article
Comparison of Adaptive Information Security Approaches.
- Published in:
- ISRN Artificial Intelligence, 2013, p. 1, doi. 10.1155/2013/482949
- By:
- Publication type:
- Article
DON'T STOP THE MUSIC: NO STRICT PRODUCTS LIABILITY FOR EMBEDDED SOFTWARE.
- Published in:
- University of Florida Journal of Law & Public Policy, 2008, v. 19, n. 1, p. 125
- By:
- Publication type:
- Article
A Model to Quantify the Return on Investment of Information Assurance.
- Published in:
- DISAM Journal of International Security Assistance Management, 2007, v. 29, n. 3, p. 125
- By:
- Publication type:
- Article
Watermarking by numbers.
- Published in:
- Nature, 1996, v. 384, n. 6609, p. 514, doi. 10.1038/384514a0
- By:
- Publication type:
- Article
1993--A bad year for software pirates.
- Published in:
- Internal Auditor, 1994, v. 51, n. 2, p. 8
- By:
- Publication type:
- Article
New SPA research targets software pirates.
- Published in:
- Internal Auditor, 1993, v. 50, n. 5, p. 11
- By:
- Publication type:
- Article
Stolen software seizures, BSA resolution herald software...
- Published in:
- CD-ROM Professional, 1996, v. 9, n. 2, p. 18
- Publication type:
- Article
DATA PROTECTION IN MICROCOMPUTER SYSTEMS AND NETWORKS.
- Published in:
- Acta Technica Corviniensis - Bulletin of Engineering, 2014, v. 7, n. 2, p. 137
- By:
- Publication type:
- Article
Research of Software Complexity Metrics with Security Indicator.
- Published in:
- Journal of Donghua University (English Edition), 2011, v. 28, n. 5, p. 460
- By:
- Publication type:
- Article
The First of Many Steps: The EU Unitary Patent, Software, and What the United Kingdom Should Do Next.
- Published in:
- Pacific McGeorge Global Business & Development Law Journal, 2013, v. 26, n. 1, p. 259
- By:
- Publication type:
- Article
RESEARCH OF ALARM CORRELATIONS BASED ON STATIC DEFECT DETECTION.
- Published in:
- Technical Gazette / Tehnički Vjesnik, 2015, v. 22, n. 2, p. 311, doi. 10.17559/TV-20150317102804
- By:
- Publication type:
- Article
Software Wars: The Patent Menace.
- Published in:
- New York Law School Law Review, 2010, v. 55, n. 1, p. 295
- By:
- Publication type:
- Article
CD DVD piracy.
- Published in:
- EMedia Professional, 1997, v. 10, n. 12, p. 92
- By:
- Publication type:
- Article
Gathering the Foam: Are Business Method Patents a Deterrent to Software Innovation and Commercialization?
- Published in:
- International Review of Law, Computers & Technology, 2003, v. 17, n. 2, p. 127, doi. 10.1080/1360086032000122538
- By:
- Publication type:
- Article
Software theft among the top 1000 organizations and their...
- Published in:
- International Review of Law, Computers & Technology, 1996, v. 10, n. 2, p. 317, doi. 10.1080/13600869.1996.9966451
- By:
- Publication type:
- Article
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 13, p. 2070, doi. 10.1002/sec.1464
- By:
- Publication type:
- Article
A security enhanced authentication and key distribution protocol for wireless networks.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 4, p. 343, doi. 10.1002/sec.312
- By:
- Publication type:
- Article
A Subtle Serial Key based Software Protection Scheme.
- Published in:
- Journal of Engineering Science & Technology Review, 2018, v. 11, n. 4, p. 48, doi. 10.25103/jestr.114.06
- By:
- Publication type:
- Article
Social construct and the propensity for software piracy.
- Published in:
- Applied Economics Letters, 2004, v. 11, n. 2, p. 97, doi. 10.1080/1350485042000200187
- By:
- Publication type:
- Article
The relationship between copyright software protection and piracy: Evidence from europe.
- Published in:
- European Journal of Law & Economics, 2006, v. 21, n. 1, p. 29, doi. 10.1007/s10657-006-5670-5
- By:
- Publication type:
- Article
Research on Safety and Compliance of a New Lower Limb Rehabilitation Robot.
- Published in:
- Journal of Healthcare Engineering, 2017, p. 1, doi. 10.1155/2017/1523068
- By:
- Publication type:
- Article
Intellectual Property Paradoxes in Developing Countries: The Case of Software IP Protection in Iran.
- Published in:
- Journal of Intellectual Property Rights, 2014, v. 19, n. 1, p. 33
- By:
- Publication type:
- Article
Open Source Software Paradigm and Intellectual Property Rights.
- Published in:
- Journal of Intellectual Property Rights, 2012, v. 17, n. 6, p. 511
- By:
- Publication type:
- Article
Software Protection: Copyrightability vs Patentability?
- Published in:
- Journal of Intellectual Property Rights, 2012, v. 17, n. 2, p. 160
- By:
- Publication type:
- Article