Suchergebnisse - "Software Protection"
-
1
Autoren: et al.
Quelle: ACM COMPUTING SURVEYS
Schlagwörter: SECURITY, FOS: Computer and information sciences, Technology and Engineering, diversification, Computer Science - Cryptography and Security, DEOBFUSCATION, 0211 other engineering and technologies, 02 engineering and technology, SOURCE CODE OBFUSCATION, TAXONOMY, 102016 IT-Sicherheit, obfuscation, 0202 electrical engineering, electronic engineering, information engineering, QUALITY, deobfuscation, software protection, Survey, Cryptography and Security (cs.CR), 102016 IT security
Dateibeschreibung: application/pdf
-
2
Quelle: Jisuanji gongcheng, Vol 51, Iss 7, Pp 275-283 (2025)
Schlagwörter: diversified compilation, code obfuscation, software protection, software diversification, active defense, Computer engineering. Computer hardware, TK7885-7895, Computer software, QA76.75-76.765
Dateibeschreibung: electronic resource
-
3
Autoren: Noam Shemtov
Resource Type: eBook.
Schlagworte: Europa¨ische Union, Copyright--Computer programs--United States, Copyright--Computer programs--European Union c, Software protection--Law and legislation--Unit, Software protection--Law and legislation--Euro, Intellectual property, Copyright--Computer programs, Software protection--Law and legislation, Urheberrecht
Categories: LAW / International
PDF-Volltext ePub Volltext -
4
Autoren: et al.
Quelle: JOURNAL OF SYSTEMS AND SOFTWARE ; ISSN: 0164-1212 ; ISSN: 1873-1228
Schlagwörter: Technology and Engineering, SOURCE CODE OBFUSCATION, Reverse engineering tools, Software protection, Man-at-the-end attacks, Empirical studies, Analysis tools, Image analysis
Dateibeschreibung: application/pdf
Relation: https://biblio.ugent.be/publication/01KBPZ8B4F66DKZBF45C9982Y8; https://doi.org/10.1016/j.jss.2025.112492; https://biblio.ugent.be/publication/01KBPZ8B4F66DKZBF45C9982Y8/file/01KC4GHCG6ZHWH8WASVNQWRKHH
-
5
Autoren: et al.
Quelle: Revista Iberoamericana de la Propiedad Intelectual; No. 22 (2025); 155-195 ; Revista Iberoamericana de la Propiedad Intelectual; Núm. 22 (2025); 155-195 ; Revista Iberoamericana de la Propiedad Intelectual; n. 22 (2025); 155-195 ; 2422-569X ; 10.26422/RIPI.2025.2200
Schlagwörter: propiedad intelectual, derechos de autor, software de ordenador, patente, leyes y legislación, revisión sistemática, PRISMA, protección del software, intellectual property, copyrights, computer software, patent, laws and legislation, systematic review, software protection, propriedade intelectual, direitos autorais, software de computador, patentes, leis e legislação, revisão sistemática, proteção de software
Dateibeschreibung: application/pdf; application/epub+zip
Relation: https://ojs.austral.edu.ar/ripi/article/view/1646/2091; https://ojs.austral.edu.ar/ripi/article/view/1646/2109; https://ojs.austral.edu.ar/ripi/article/view/1646
-
6
Autoren: Anton Hughes
Resource Type: eBook.
Schlagworte: Patent laws and legislation, Software protection--Law and legislation, Mathematics, Computer software--Law and legislation
PDF-Volltext ePub Volltext -
7
Autoren: Gerardo Con Diaz
Resource Type: eBook.
Schlagworte: Patent laws and legislation--United States--History, Computer software--United States--Patents--History, Software protection--Law and legislation--United States--History, Computer software industry--Law and legislation--History
Categories: LAW / Intellectual Property / Patent, BUSINESS & ECONOMICS / Corporate & Business History, LAW / Legal History
PDF-Volltext ePub Volltext -
8
Autoren: BERGER, EMERY D.1 (AUTHOR)
Quelle: Communications of the ACM. Sep2012, Vol. 55 Issue 9, p48-53. 6p. 1 Color Photograph.
-
9
Autoren:
Quelle: IEEE Open Journal of the Computer Society, Vol 4, Pp 206-217 (2023)
-
10
Autoren:
Quelle: Communications of the ACM. Sep84, Vol. 27 Issue 9, p950-959. 10p. 4 Diagrams.
Schlagwörter: *SOFTWARE protection, *COMPUTER access control, COPYRIGHT of electronic data
-
11
Autoren: Fabry, R. S.1
Quelle: Communications of the ACM. Jul1974, Vol. 17 Issue 7, p403-412. 10p. 6 Diagrams.
Schlagwörter: *COMPUTER programming, *SOFTWARE protection, *COMPUTER access control, *ALGORITHMS, *DATA protection, CAPABILITY maturity model
-
12
Autoren: Kani Li
Quelle: Measurement: Sensors, Vol 31, Iss , Pp 100978- (2024)
Schlagwörter: Artificial intelligence, Software protection, Information security, Digital media, Visual arts, Electric apparatus and materials. Electric circuits. Electric networks, TK452-454.4
Dateibeschreibung: electronic resource
-
13
Autoren: Samuelson, Pamela1 pam@law.berkeley.edu
Quelle: Communications of the ACM. Mar2011, Vol. 54 Issue 3, p26-28. 3p. 1 Color Photograph.
Schlagwörter: *SOFTWARE protection, *COPYRIGHT licenses, *COPYRIGHT of software, *COMPUTER software industry, *COPYRIGHT, COPYRIGHT cases
Geografische Kategorien: UNITED States
-
14
Autoren: et al.
Quelle: Journal of Systems & Software. Apr2019, Vol. 150, p3-21. 19p.
Schlagwörter: *SOFTWARE protection, *CRYPTOGRAPHY, *DATA security, REVERSE engineering software, SOFTWARE validation
-
15
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Journal of Hardware and Systems Security. 5:143-168
Schlagwörter: Support for security, Security and Protection, [SPI.ELEC] Engineering Sciences [physics]/Electromagnetism, eavesdropping, TEMPEST, 0202 electrical engineering, electronic engineering, information engineering, electromagnetic emanation, Hardware/Software Protection, Side-channel attacks, 02 engineering and technology, [SPI.TRON] Engineering Sciences [physics]/Electronics, [SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
Zugangs-URL: https://hal.archives-ouvertes.fr/hal-03176249/file/WhisperingDevices.pdf
https://hal.archives-ouvertes.fr/hal-03176249/document
https://hal.archives-ouvertes.fr/hal-03176249
https://link.springer.com/article/10.1007/s41635-021-00112-6
https://doi.org/10.1007/s41635-021-00112-6
https://hal.science/hal-03176249v1/document
https://hal.science/hal-03176249v1
https://doi.org/10.1007/s41635-021-00112-6 -
16
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Proceedings of the 18th International Conference on Security and Cryptography. :247-258
Schlagwörter: MATE Attacks, Virtualization, Symbolic Analysis, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, [INFO] Computer Science [cs], Software Protection, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
-
17
Autoren: Canitrot, Carolina A.
Quelle: Revista Iberoamericana de la Propiedad Intelectual; No. 21 (2024); 347-437 ; Revista Iberoamericana de la Propiedad Intelectual; Núm. 21 (2024); 347-437 ; Revista Iberoamericana de la Propiedad Intelectual; n. 21 (2024); 347-437 ; 2422-569X ; 10.26422/RIPI.2024.2100
Schlagwörter: software, propiedad intelectual, derechos de autor, políticas corporativas, empresas tecnológicas, cláusulas contractuales, protección del software, propiedad industrial, licencias de software, gestión de derechos, innovación tecnológica, intellectual property, copyright, corporate policies, technology companies, contractual clauses, software protection, industrial property, software licenses, rights management, technological innovation, riedade intelectual, direito autoral, empresas de tecnologia, cláusulas contratuais, proteção de software, propriedade industrial, licenças de software, gestão de direitos, inovação tecnológica
Dateibeschreibung: application/pdf; application/epub+zip
Relation: https://ojs.austral.edu.ar/ripi/article/view/1668/1903; https://ojs.austral.edu.ar/ripi/article/view/1668/1904; https://ojs.austral.edu.ar/ripi/article/view/1668
-
18
Autoren: et al.
Quelle: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
Schlagwörter: reverse engineering, self-debugging, FOS: Computer and information sciences, Technology and Engineering, Computer Science - Cryptography and Security, 0202 electrical engineering, electronic engineering, information engineering, anti-debugging, 02 engineering and technology, software protection, Cryptography and Security (cs.CR), anti-tampering
Dateibeschreibung: application/pdf
Zugangs-URL: https://biblio.ugent.be/publication/8668175/file/8668185.pdf
http://arxiv.org/abs/2004.06417
https://arxiv.org/abs/2004.06417
https://arxiv.org/pdf/2004.06417
http://dblp.uni-trier.de/db/conf/eurosp/eurosp2020w.html#AbrathCNS20
https://www.computer.org/csdl/proceedings-article/euros&pw/2020/859700a606/1o8qoEwgDkc
https://biblio.ugent.be/publication/8668175
https://dblp.uni-trier.de/db/journals/corr/corr2004.html#abs-2004-06417
https://arxiv.org/abs/2004.06417
https://arxiv.org/pdf/2004.06417.pdf
https://ui.adsabs.harvard.edu/abs/2020arXiv200406417A/abstract
https://biblio.ugent.be/publication/8668175/file/8668185
http://hdl.handle.net/1854/LU-8668175
http://doi.org/10.1109/EuroSPW51379.2020.00088
https://biblio.ugent.be/publication/8668175 -
19
Autoren: et al.
Quelle: Journal of Information Security & Applications. Nov2024, Vol. 86, pN.PAG-N.PAG. 1p.
Schlagwörter: *SOFTWARE protection, *COMPUTER crimes
-
20
Autoren: et al.
Quelle: Computers & Security. May2018, Vol. 74, p202-220. 19p.
Schlagwörter: *VIRTUAL machine systems, *SOFTWARE protection, *PROTOTYPES, COMPUTER software security, REVERSE engineering
Full Text Finder
Nájsť tento článok vo Web of Science