Works matching DE "SOFTWARE protection"
1
- Journal of Systems Science & Information, 2009, v. 7, n. 2, p. 103
- Xufeng Zhao;
- Cunhua Qian;
- Toshio, Nakagawa
- Article
2
- European Journal of Law & Economics, 2006, v. 21, n. 1, p. 29, doi. 10.1007/s10657-006-5670-5
- Article
3
- Technical Gazette / Tehnički Vjesnik, 2015, v. 22, n. 2, p. 311, doi. 10.17559/TV-20150317102804
- Dalin Zhang;
- Dahai Jin;
- Yunzhan Gong;
- Siru Chen;
- Chengcheng Wang
- Article
4
- Social Behavior & Personality: an international journal, 2008, v. 36, n. 1, p. 1, doi. 10.2224/sbp.2008.36.1.1
- Article
5
- Berkeley Technology Law Journal, 2006, v. 21, n. 4, p. 1421
- Article
6
- Berkeley Technology Law Journal, 2006, v. 21, n. 1, p. 551
- Article
7
- ITNOW, 2007, v. 49, n. 4, p. 10, doi. 10.1093/itnow/bwm004
- Article
8
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 82, doi. 10.1109/TSE.2007.70772
- Heitmeyer, Constance L.;
- Archer, Myla M.;
- Leonard, Elizabeth I.;
- McLean, John D.
- Article
9
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 65, doi. 10.1109/TSE.2007.70748
- Halfond, William G. J.;
- Orso, Alessandro;
- Manolios, Panagiotis
- Article
10
- IEEE Transactions on Software Engineering, 2002, v. 28, n. 8, p. 735, doi. 10.1109/TSE.2002.1027797
- Collberg, Christian S.;
- Thomborson, Clark
- Article
11
- IEEE Transactions on Software Engineering, 2002, v. 28, n. 1, p. 100, doi. 10.1109/32.979991
- Devanbu, Premkumar T.;
- Stubblebine, Stuart G.
- Article
12
- Journal of World Intellectual Property, 2013, v. 16, n. 1/2, p. 87, doi. 10.1002/jwip.12009
- Vasudeva, Vikrant Narayan
- Article
13
- 2014
- Ajamie, Lauren;
- Bunton, Glenn;
- Fox, Shannon;
- Moore, Monica
- Proceeding
14
- Electronics & Electrical Engineering, 2011, n. 112, p. 111
- Liutkevicius, A.;
- Vrubliauskas, A.;
- Kazanavicius, E.
- Article
15
- ISeCure, 2017, v. 9, n. 1, p. 73
- Safarzadeh, Marzieh;
- Taghizadeh, Mahboubeh;
- Zamani, Bahman;
- Ladani, Behrouz Tork
- Article
16
- ISeCure, 2017, v. 9, n. 1, p. 53
- Sadeghi, AliAkbar;
- Aminmansour, Farzane;
- Shahriari, HamidReza
- Article
17
- ISeCure, 2017, v. 9, n. 1, p. 17
- Aerabi, Ehsan;
- Kaykha, Mahdi;
- Fazeli, Mahdi;
- Patooghy, Ahmad;
- Akbari, Ahmad
- Article
18
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 4, p. 510, doi. 10.1109/TDSC.2011.16
- Miao Jiang;
- Munawar, Mohammad A.;
- Reidemeister, Thomas;
- Ward, Paul A. S.
- Article
19
- New York Law School Law Review, 2010, v. 55, n. 1, p. 295
- Article
20
- Boston Review, 2022, v. 47, n. 4, p. 139
- Article
21
- Journal of Cryptology, 2014, v. 27, n. 3, p. 480, doi. 10.1007/s00145-013-9151-z
- Goldwasser, Shafi;
- Rothblum, Guy
- Article
22
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 32, doi. 10.18372/2225-5036.22.10451
- I., Stepanenko;
- V., Kinzerya;
- A., Nagi;
- I., Lozinskyi
- Article
23
- Business Forum, 1992, v. 17, n. 2, p. 10
- Article
24
- Akron Intellectual Property Journal, 2010, v. 4, n. 1, p. 35
- Article
25
- Nordic Journal of Commercial Law, 2013, n. 2, p. 1
- Article
26
- International Journal of Intelligent Information Technology Application, 2009, v. 2, n. 3, p. 136
- Article
27
- International Review on Computers & Software, 2013, v. 8, n. 8, p. 1980
- Sasirekha, N.;
- Hemalatha, M.
- Article
28
- International Review on Computers & Software, 2013, v. 8, n. 6, p. 1445
- Meenakumari, M.;
- Athisha, G.
- Article
29
- Homeland Defense Journal, 2007, v. 5, n. 8, p. 32
- Article
30
- Information Society, 2008, v. 24, n. 4, p. 199, doi. 10.1080/01972240802189468
- Holsapple, ClydeW.;
- Iyengar, Deepak;
- Jin, Haihao;
- Rao, Shashank
- Article
31
- ETRI Journal, 2011, v. 33, n. 1, p. 60, doi. 10.4218/etrij.11.0110.0056
- Sungkyu Cho;
- Donghwi Shin;
- Heasuk Jo;
- Donghyun Choi;
- Dongho Won;
- Seungjoo Kim
- Article
32
- Journal of Intellectual Property Rights, 2014, v. 19, n. 1, p. 33
- Seyed Kamran Bagheri;
- Casprini, Elena
- Article
33
- Journal of Intellectual Property Rights, 2012, v. 17, n. 6, p. 511
- Vasudeva, Vikrant Narayan
- Article
34
- Journal of Intellectual Property Rights, 2012, v. 17, n. 2, p. 160
- Article
35
- Journal of Intellectual Property Rights, 2007, v. 12, n. 3, p. 365
- Article
36
- Journal of Intellectual Property Rights, 2007, v. 12, n. 3, p. 363
- Article
37
- Journal of Intellectual Property Rights, 2007, v. 12, n. 3, p. 354
- Article
38
- Nature, 1996, v. 384, n. 6609, p. 514, doi. 10.1038/384514a0
- Article
39
- IEEE Software, 2011, v. 28, n. 2, p. 56, doi. 10.1109/MS.2011.39
- Gu, Yuan Xiang;
- Wyseur, Brecht;
- Preneel, Bart;
- Aussel, Jean-Daniel;
- Sailer, Reiner
- Article
40
- IEEE Software, 2011, v. 28, n. 2, p. 1, doi. 10.1109/MS.2011.33
- Article
41
- IEEE Software, 2011, v. 28, n. 2, p. 48, doi. 10.1109/MS.2010.161
- Gangadharan, G. R.;
- D'Andrea, Vincenzo
- Article
42
- IEEE Software, 2011, v. 28, n. 2, p. 28, doi. 10.1109/MS.2010.158
- Ceccato, Mariano;
- Tonella, Paolo
- Article
43
- IEEE Software, 2003, v. 20, n. 6, p. 96, doi. 10.1109/MS.2003.1241375
- Article
44
- IEEE Software, 1999, v. 16, n. 2, p. 33, doi. 10.1109/52.754050
- Article
45
- IEEE Software, 1999, v. 16, n. 1, p. 28, doi. 10.1109/52.744563
- Article
46
- Harvard Journal of Law & Public Policy, 2006, v. 30, n. 1, p. 283
- Hahn, Robert W.;
- Layne-Farrar, Anne
- Article
47
- Journal of Donghua University (English Edition), 2011, v. 28, n. 5, p. 460
- Article
48
- EMedia Professional, 1997, v. 10, n. 12, p. 92
- Article
49
- Internal Auditor, 1994, v. 51, n. 2, p. 8
- Article
50
- Internal Auditor, 1993, v. 50, n. 5, p. 11
- Article