From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

K-gram based software birthmarks., и . SAC, стр. 314-318. ACM, (2005)Graph-Based Approaches to Software Watermarking., , , и . WG, том 2880 из Lecture Notes in Computer Science, стр. 156-167. Springer, (2003)Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection., и . Addison-Wesley Software Security Series Addison-Wesley, (2010)A System for Graph-Based Visualization of the Evolution of Software., , , , и . SOFTVIS, стр. 77-86. ACM, (2003)Problem identification using program checking., и . Discret. Appl. Math., 144 (3): 270-280 (2004)Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning., , и . USENIX Security Symposium, стр. 661-678. USENIX Association, (2017)Detecting Software Theft via Whole Program Path Birthmarks., и . ISC, том 3225 из Lecture Notes in Computer Science, стр. 404-415. Springer, (2004)Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection., и . IEEE Trans. Software Eng., 28 (8): 735-746 (2002)Code Obfuscation: Why is This Still a Thing?. CODASPY, стр. 173-174. ACM, (2018)Pinpointing and Hiding Surprising Fragments in an Obfuscated Program., , , и . PPREW@ACSAC, стр. 8:1-8:9. ACM, (2015)