咨询与建议

限定检索结果

文献类型

  • 240 篇 会议
  • 90 篇 期刊文献
  • 5 册 图书
  • 3 篇 学位论文

馆藏范围

  • 338 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 229 篇 工学
    • 185 篇 计算机科学与技术...
    • 77 篇 电气工程
    • 73 篇 软件工程
    • 34 篇 信息与通信工程
    • 11 篇 网络空间安全
    • 10 篇 控制科学与工程
    • 6 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 2 篇 材料科学与工程(可...
    • 2 篇 测绘科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 安全科学与工程
  • 19 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 10 篇 理学
    • 4 篇 数学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 1 篇 地球物理学
  • 6 篇 法学
    • 5 篇 法学
    • 1 篇 社会学
  • 3 篇 文学
    • 3 篇 新闻传播学
  • 1 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学

主题

  • 338 篇 software protect...
  • 47 篇 software
  • 38 篇 security
  • 37 篇 reverse engineer...
  • 34 篇 obfuscation
  • 33 篇 hardware
  • 32 篇 cryptography
  • 19 篇 computer securit...
  • 18 篇 application soft...
  • 17 篇 code obfuscation
  • 16 篇 information secu...
  • 15 篇 data security
  • 14 篇 computer archite...
  • 13 篇 software algorit...
  • 13 篇 intellectual pro...
  • 12 篇 computer science
  • 12 篇 runtime
  • 12 篇 java
  • 12 篇 encryption
  • 12 篇 watermarking

机构

  • 5 篇 univ arizona dep...
  • 4 篇 tech univ munich...
  • 3 篇 fdn bruno kessle...
  • 3 篇 univ hong kong d...
  • 3 篇 university of ea...
  • 3 篇 univ ghent comp ...
  • 3 篇 univ auckland de...
  • 2 篇 penn state univ ...
  • 2 篇 univ oberta cata...
  • 2 篇 zhongguancun lab...
  • 2 篇 tsinghua univ sc...
  • 2 篇 future universit...
  • 2 篇 school of inform...
  • 2 篇 univ chinese aca...
  • 2 篇 department of el...
  • 2 篇 fondazione bruno...
  • 2 篇 tech univ munich...
  • 2 篇 univ s alabama d...
  • 2 篇 politecnico di t...
  • 2 篇 chinese acad sci...

作者

  • 11 篇 de sutter bjorn
  • 8 篇 basile cataldo
  • 7 篇 coppens bart
  • 7 篇 banescu sebastia...
  • 6 篇 collberg christi...
  • 6 篇 mcdonald j. todd
  • 5 篇 kanzaki yuichiro
  • 5 篇 canavese daniele
  • 5 篇 pretschner alexa...
  • 5 篇 paolo falcarin
  • 4 篇 bjorn de sutter
  • 4 篇 wu dinghao
  • 4 篇 dingyi fang
  • 4 篇 andel todd r.
  • 4 篇 monden akito
  • 4 篇 ahmadvand mohsen
  • 4 篇 wang pei
  • 4 篇 schrittwieser se...
  • 4 篇 lee dong hoon
  • 4 篇 regano leonardo

语言

  • 330 篇 英文
  • 6 篇 其他
  • 2 篇 中文
检索条件"主题词=Software Protection"
338 条 记 录,以下是1-10 订阅
排序:
Evaluation Methodologies in software protection Research
收藏 引用
ACM COMPUTING SURVEYS 2025年 第4期57卷 1-41页
作者: De Sutter, Bjorn Schrittwieser, Sebastian Coppens, Bart Kochberger, Patrick Univ Ghent Elect & Informat Syst Ghent Belgium Univ Vienna Christian Doppler Lab Assurance & Transparency Sof Vienna Austria St Polten Univ Appl Sci Inst IT Secur Res St Polten Austria
Man-at-the-end (MATE) attackers have full control over the system on which the attacked software runs, and try to break the confidentiality or integrity of assets embedded in the software. Both companies and malware a... 详细信息
来源: 评论
software protection and simulation on oblivious RAMs
收藏 引用
JOURNAL OF THE ACM 1996年 第3期43卷 431-473页
作者: Goldreich, O Ostrovsky, R BELL COMMUN RES INC MORRISTOWNNJ
software protection is one of the most important issues concerning computer practice. There exist many heuristics and ad-hoc methods for protection, but the problem as a whole has not received the theoretical treatmen... 详细信息
来源: 评论
software protection Using Dynamic PUFs
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020年 15卷 2053-2068页
作者: Xiong, Wenjie Schaller, Andre Katzenbeisser, Stefan Szefer, Jakub Yale Univ Dept Elect Engn New Haven CT 06520 USA Tech Univ Darmstadt Comp Sci Dept D-64289 Darmstadt Germany Univ Passau Comp Engn D-94032 Passau Germany
Low-end computing devices are becoming increasingly ubiquitous, especially due to the widespread deployment of Internet-of-Things products. There is, however, much concern about sensitive data being processed on these... 详细信息
来源: 评论
software protection through anti-debugging
收藏 引用
IEEE SECURITY & PRIVACY 2007年 第3期5卷 82-84页
作者: Gagnon, Michael N. Taylor, Stephen Ghosh, Anup K. George Mason University
This column presents the reverse engineering battle from an anti-debugging perspective.
来源: 评论
software protection with Encryption and Verification  1
收藏 引用
Pacific-Asia Conference on Knowledge Engineering and software Engineering
作者: Liu, Wentao Wuhan Polytech Univ Dept Comp & Informat Engn Wuhan 430023 Hubei Provice Peoples R China
The software protection is the key technology for the shareware and it can delay and prevent the software reverse and cracking. There are many methods such as junk code, anti-debug, virtual machine, deformation, packe... 详细信息
来源: 评论
software protection with Increased Complexity and Obfuscation  12
Software Protection with Increased Complexity and Obfuscatio...
收藏 引用
50th Annual Association-for-Computing-Machinery (ACM) Southeast Conference
作者: Tsui, Frank Duggins, Sheryl Karam, Orlando Southern Polytech State Univ Marietta GA 30060 USA
While many software solutions are provided through open source, the question of proprietary interest still remains. When outsourcing parts of a product's software development, there's a risk that the outsourci... 详细信息
来源: 评论
KeySplitWatermark: Zero Watermarking Algorithm for software protection Against Cyber-Attacks
收藏 引用
IEEE ACCESS 2020年 8卷 72650-72660页
作者: Iwendi, Celestine Jalil, Zunera Javed, Abdul Rehman Reddy, Thippa G. Kaluri, Rajesh Srivastava, Gautam Jo, Ohyun Cent South Univ Forestry & Technol Dept Elect BCC Changsha 410004 Peoples R China Air Univ Dept Cyber Secur Islamabad 44000 Pakistan Air Univ Natl Ctr Cyber Secur Islamabad 44000 Pakistan VIT Sch Informat Technol & Engn Vellore 632014 Tamil Nadu India Brandon Univ Dept Math & Comp Sci Brandon MB R7A 6A9 Canada China Med Univ Res Ctr Interneural Comp Taichung 40402 Taiwan Chungbuk Natl Univ Coll Elect & Comp Engn Dept Comp Sci Cheongju 28644 South Korea
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing wit... 详细信息
来源: 评论
A Method for Construction of software protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs
收藏 引用
IEEE ACCESS 2018年 6卷 11988-12000页
作者: Su, Qing He, Fan Wu, Naiqi Lin, Zhiyi Guangdong Univ Technol Sch Comp Sci & Technol Guangzhou 510006 Guangdong Peoples R China Macau Univ Sci & Technol Inst Syst Engn Macau 999078 Peoples R China
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize ... 详细信息
来源: 评论
Some reflections on the duality of regime for software protection in the European Union
收藏 引用
COMPUTER LAW & SECURITY REVIEW 2013年 第3期29卷 282-288页
作者: Polanski, Paul Przemyslaw Kozminski Univ Dept Informat Syst Warsaw Poland
Although the framework for protection of computer programs has been established in the European Union more than two decades ago, it has not undergone any major changes. Opinions of Advocate General Yves Bot have convi... 详细信息
来源: 评论
High-performance software protection using reconfigurable architectures
收藏 引用
PROCEEDINGS OF THE IEEE 2006年 第2期94卷 419-431页
作者: Zambreno, J Honbo, D Choudhary, A Simha, R Narahari, B Northwestern Univ Dept Elect & Comp Engn Evanston IL 60208 USA George Washington Univ Dept Comp Sci Washington DC 20052 USA
One of the key problems facing the computer industry today is ensuring the integrity of end-user applications and data. Researchers in the relatively newfield of software protection investigate the development and eva... 详细信息
来源: 评论