Works matching DE "SOFTWARE protection"
1
- Nature, 1996, v. 384, n. 6609, p. 514, doi. 10.1038/384514a0
- Article
2
- Science & Engineering Ethics, 2015, v. 21, n. 4, p. 967, doi. 10.1007/s11948-014-9573-5
- Santillanes, Gary;
- Felder, Ryan
- Article
3
- European Journal of Law & Economics, 2006, v. 21, n. 1, p. 29, doi. 10.1007/s10657-006-5670-5
- Article
4
- New York Law School Law Review, 2010, v. 55, n. 1, p. 295
- Article
5
- Information Society, 2008, v. 24, n. 4, p. 199, doi. 10.1080/01972240802189468
- Holsapple, ClydeW.;
- Iyengar, Deepak;
- Jin, Haihao;
- Rao, Shashank
- Article
6
- Journal of Systems Science & Information, 2009, v. 7, n. 2, p. 103
- Xufeng Zhao;
- Cunhua Qian;
- Toshio, Nakagawa
- Article
7
- Software Quality Journal, 2008, v. 16, n. 4, p. 543, doi. 10.1007/s11219-008-9053-8
- Article
8
- Journal of Cryptology, 2014, v. 27, n. 3, p. 480, doi. 10.1007/s00145-013-9151-z
- Goldwasser, Shafi;
- Rothblum, Guy
- Article
9
- Internal Auditor, 1994, v. 51, n. 2, p. 8
- Article
10
- Internal Auditor, 1993, v. 50, n. 5, p. 11
- Article
11
- Revista da Universidade Vale do Rio Verde, 2011, v. 9, n. 1, p. 211, doi. 10.5892/RUVRV.91.211219
- Neto, Alfredo del Fabro;
- Turchetti, Rogério;
- Trois, Célio;
- Filho, Walter Priesnitz;
- Palmeira, Eunice;
- Simonetto, Eugênio
- Article
12
- Computer Journal, 1996, v. 39, n. 7, p. 566, doi. 10.1093/comjnl/39.7.566
- Cifuentes, C.;
- Fitzgerald, A.
- Article
13
- Journal of Donghua University (English Edition), 2011, v. 28, n. 5, p. 460
- Article
14
- Applied Economics Letters, 2004, v. 11, n. 2, p. 97, doi. 10.1080/1350485042000200187
- Depken, C. A.;
- Simmons, L. C.
- Article
15
- International Journal of Intelligent Information Technology Application, 2009, v. 2, n. 3, p. 136
- Article
16
- DISAM Journal of International Security Assistance Management, 2007, v. 29, n. 3, p. 125
- Article
17
- Berkeley Technology Law Journal, 2006, v. 21, n. 4, p. 1421
- Article
18
- Berkeley Technology Law Journal, 2006, v. 21, n. 1, p. 551
- Article
19
- Journal of World Intellectual Property, 2013, v. 16, n. 1/2, p. 87, doi. 10.1002/jwip.12009
- Vasudeva, Vikrant Narayan
- Article
20
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 32, doi. 10.18372/2225-5036.22.10451
- I., Stepanenko;
- V., Kinzerya;
- A., Nagi;
- I., Lozinskyi
- Article
21
- CD-ROM Professional, 1996, v. 9, n. 2, p. 18
- Article
22
- University of Florida Journal of Law & Public Policy, 2008, v. 19, n. 1, p. 125
- Article
23
- Technical Services Quarterly, 2019, v. 36, n. 2, p. 177, doi. 10.1080/07317131.2019.1584983
- Article
24
- Social Behavior & Personality: an international journal, 2008, v. 36, n. 1, p. 1, doi. 10.2224/sbp.2008.36.1.1
- Article
25
- IEEE Software, 2011, v. 28, n. 2, p. 56, doi. 10.1109/MS.2011.39
- Gu, Yuan Xiang;
- Wyseur, Brecht;
- Preneel, Bart;
- Aussel, Jean-Daniel;
- Sailer, Reiner
- Article
26
- IEEE Software, 2011, v. 28, n. 2, p. 1, doi. 10.1109/MS.2011.33
- Article
27
- IEEE Software, 2011, v. 28, n. 2, p. 48, doi. 10.1109/MS.2010.161
- Gangadharan, G. R.;
- D'Andrea, Vincenzo
- Article
28
- IEEE Software, 2011, v. 28, n. 2, p. 28, doi. 10.1109/MS.2010.158
- Ceccato, Mariano;
- Tonella, Paolo
- Article
29
- IEEE Software, 2003, v. 20, n. 6, p. 96, doi. 10.1109/MS.2003.1241375
- Article
30
- IEEE Software, 1999, v. 16, n. 2, p. 33, doi. 10.1109/52.754050
- Article
31
- IEEE Software, 1999, v. 16, n. 1, p. 28, doi. 10.1109/52.744563
- Article
32
- ISRN Artificial Intelligence, 2013, p. 1, doi. 10.1155/2013/482949
- Evesti, Antti;
- Ovaska, Eila
- Article
33
- Romanian Journal of Intellectual Property Law / Revista Română de Dreptul Proprietăţii Intelectuale, 2016, n. 2, p. 41
- Article
34
- Romanian Journal of Intellectual Property Law / Revista Română de Dreptul Proprietăţii Intelectuale, 2015, n. 2, p. 198
- Gheorghiu, Raluca-Gabriela
- Article
35
- Nordic Journal of Commercial Law, 2013, n. 2, p. 1
- Article
36
- Journal of Engineering Science & Technology Review, 2018, v. 11, n. 4, p. 48, doi. 10.25103/jestr.114.06
- Adekitan, Aderibigbe Israel;
- Orimogunje, Abidemi
- Article
37
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 1, p. 45, doi. 10.1080/10658980701824432
- Weber, JamesE.;
- Guster, Dennis;
- Safonov, Paul;
- Schmidt, MarkB.
- Article
38
- Journal of Medical Systems, 2002, v. 26, n. 3, p. 221, doi. 10.1023/A:1015062301029
- Kobayashi, Shinji;
- Goudge, Masamichi;
- Makie, Toshio;
- Hanada, Eisuke;
- Harada, Mine;
- Nose, Yoshiaki
- Article
39
- EMedia Professional, 1997, v. 10, n. 12, p. 92
- Article
40
- Business Forum, 1992, v. 17, n. 2, p. 10
- Article
42
- International Journal of Law & Information Technology, 2000, v. 8, n. 1, p. 25, doi. 10.1093/ijlit/8.1.25
- Article
43
- International Journal of Law & Information Technology, 1999, v. 7, n. 1, doi. 10.1093/ijlit/7.1.1
- Article
44
- Acta Technica Corviniensis - Bulletin of Engineering, 2014, v. 7, n. 2, p. 137
- RAMAKIĆ, Adnan;
- BUNDALO, Zlatko
- Article
45
- International Review on Computers & Software, 2013, v. 8, n. 8, p. 1980
- Sasirekha, N.;
- Hemalatha, M.
- Article
46
- International Review on Computers & Software, 2013, v. 8, n. 6, p. 1445
- Meenakumari, M.;
- Athisha, G.
- Article
47
- Journal of Intellectual Property Rights, 2014, v. 19, n. 1, p. 33
- Seyed Kamran Bagheri;
- Casprini, Elena
- Article
48
- Journal of Intellectual Property Rights, 2012, v. 17, n. 6, p. 511
- Vasudeva, Vikrant Narayan
- Article
49
- Journal of Intellectual Property Rights, 2012, v. 17, n. 2, p. 160
- Article
50
- Journal of Intellectual Property Rights, 2007, v. 12, n. 3, p. 365
- Article