Journal articles on the topic 'Software protection. Computer software'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software protection. Computer software.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Aubyn, John St. "Computer-software protection." Learned Publishing 5, no. 2 (January 1, 1992): 103–4. http://dx.doi.org/10.1002/leap/50035.
Full textMenell, Peter S. "Tailoring Legal Protection for Computer Software." Stanford Law Review 39, no. 6 (July 1987): 1329. http://dx.doi.org/10.2307/1228849.
Full textCifuentes, C. "Australian Recommendations on Computer Software Protection." Computer Journal 39, no. 7 (July 1, 1996): 566–76. http://dx.doi.org/10.1093/comjnl/39.7.566.
Full textGreaves, D. W. "Computer software — Protection/liability/law/forms." Computer Law & Security Review 4, no. 3 (September 1988): 5. http://dx.doi.org/10.1016/0267-3649(88)90026-x.
Full textAssia, Naomi. "Software protection in Israel." International Review of Law, Computers & Technology 7, no. 1 (January 1993): 221–30. http://dx.doi.org/10.1080/13600869.1993.9966364.
Full textTan, Hua Shan, and Yang Yang. "A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption." Advanced Materials Research 756-759 (September 2013): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1215.
Full textZhao, Chun Yang, and Wei Ping Wang. "USB Storage Device Protection Software." Advanced Materials Research 722 (July 2013): 244–49. http://dx.doi.org/10.4028/www.scientific.net/amr.722.244.
Full textSamuels, Linda B., and Jeffrey M. Samuels. "New Developments in Copyright Protection of Computer Software." International Journal of Legal Information 15, no. 5-6 (December 1987): 195–200. http://dx.doi.org/10.1017/s0731126500021090.
Full textRoarke, Robert F., and Catherine Szenczy. "Computer software and copyright protection: Health care implications." Journal of Healthcare Risk Management 12, no. 4 (June 1992): 5–11. http://dx.doi.org/10.1002/jhrm.5600120404.
Full textShalgi, Moshe. "Copyright in Software and Data." Israel Law Review 21, no. 1 (1986): 15–22. http://dx.doi.org/10.1017/s0021223700008852.
Full textLi, Yu Xiang. "The Choice of Legal Protection Mode of Computer Software." Advanced Materials Research 926-930 (May 2014): 2827–31. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2827.
Full textXiong, Wenjie, Andre Schaller, Stefan Katzenbeisser, and Jakub Szefer. "Software Protection Using Dynamic PUFs." IEEE Transactions on Information Forensics and Security 15 (2020): 2053–68. http://dx.doi.org/10.1109/tifs.2019.2955788.
Full textStytz, M. R., and J. A. Whittaker. "Software protection: security's last stand?" IEEE Security & Privacy 1, no. 1 (January 2003): 95–98. http://dx.doi.org/10.1109/msecp.2003.1177004.
Full textSyarif, Hisyam. "English about Antivirus Software." International Research Journal of Management, IT & Social Sciences 2, no. 1 (January 1, 2015): 26. http://dx.doi.org/10.21744/irjmis.v2i1.56.
Full textBorking, John. "Contract solutions in software protection." Computer Law & Security Review 1, no. 1 (May 1985): 1–3. http://dx.doi.org/10.1016/0267-3649(85)90036-6.
Full textJerrard, D. G. "International legal protection for software." Computer Law & Security Review 6, no. 4 (November 1990): 13. http://dx.doi.org/10.1016/0267-3649(90)90128-x.
Full textGautam, Pratiksha, and Hemraj Saini. "A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security." International Journal of Mobile Computing and Multimedia Communications 8, no. 1 (January 2017): 34–47. http://dx.doi.org/10.4018/ijmcmc.2017010103.
Full textDunn, Susan A. "Defining the Scope of Copyright Protection for Computer Software." Stanford Law Review 38, no. 2 (January 1986): 497. http://dx.doi.org/10.2307/1228702.
Full textDubrovin, A. S., E. A. Rogozin, Yu A. Meshcheryakov, and V. V. Obukhov. "Program Techniques for Software Protection in Computer-Aided Systems." Telecommunications and Radio Engineering 62, no. 7 (2004): 633–38. http://dx.doi.org/10.1615/telecomradeng.v62.i7.50.
Full textTANI, YOSHIKAZU. "Protection of Computer Software by Means of Patent System." Journal of the Institute of Electrical Engineers of Japan 114, no. 6 (1994): 385–88. http://dx.doi.org/10.1541/ieejjournal.114.385.
Full textDonovan, S. "Patent, copyright and trade secret protection for computer software." IEEE Antennas and Propagation Magazine 34, no. 1 (February 1992): 33–38. http://dx.doi.org/10.1109/74.125887.
Full textJackson, Keith. "The protection of computer software— its technology and application." Computer Fraud & Security Bulletin 11, no. 10 (August 1989): 13–14. http://dx.doi.org/10.1016/0142-0496(89)90164-1.
Full textPuri, K. "Copyright protection of software in Australia." Information & Communications Technology Law 1, no. 1 (January 1992): 79–114. http://dx.doi.org/10.1080/13600834.1992.9965643.
Full textWehlau, Andreas. "Software protection under European community law." Information & Communications Technology Law 2, no. 1 (January 1993): 3–19. http://dx.doi.org/10.1080/13600834.1993.9965665.
Full textKnight, J. "Fascinating book on protection of software." Information and Software Technology 33, no. 5 (June 1991): 384. http://dx.doi.org/10.1016/0950-5849(91)90109-o.
Full textWang, Pin. "Safety Testing Method Analysis of Computer Software." Applied Mechanics and Materials 299 (February 2013): 135–38. http://dx.doi.org/10.4028/www.scientific.net/amm.299.135.
Full textRebecchi, Filippo, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet, and Vania Conan. "DDoS protection with stateful software-defined networking." International Journal of Network Management 29, no. 1 (August 9, 2018): e2042. http://dx.doi.org/10.1002/nem.2042.
Full textKamel, Ibrahim, and Qutaiba Albluwi. "A robust software watermarking for copyright protection." Computers & Security 28, no. 6 (September 2009): 395–409. http://dx.doi.org/10.1016/j.cose.2009.01.007.
Full textShin, Yukyun “Harry.” "Protection and Enforcement of Copyright for Computer Software in Korea." Journal of World Intellectual Property 3, no. 4 (November 1, 2005): 467–92. http://dx.doi.org/10.1111/j.1747-1796.2000.tb00138.x.
Full textLi, Chiang Ling. "The New Prc Regulation for the Protection of Computer Software." Journal of World Intellectual Property 5, no. 3 (November 1, 2005): 491–99. http://dx.doi.org/10.1111/j.1747-1796.2002.tb00167.x.
Full textMenell, Peter S. "The Challenges of Reforming Intellectual Property Protection for Computer Software." Columbia Law Review 94, no. 8 (December 1994): 2644. http://dx.doi.org/10.2307/1123151.
Full textMoldovyan, A. A., and N. A. Moldovyan. "SOFTWARE ENCRYPTION ALGORITHMS FOR TRANSPARENT PROTECTION TECHNOLOGY." Cryptologia 22, no. 1 (January 1998): 56–68. http://dx.doi.org/10.1080/0161-119891886786.
Full textAnil, Aditya, D. K. Mohanta, D. Sinha Roy, and A. K. Panda. "Software reliability estimation of computer relaying for transmission line protection using user-oriented software reliability model." International Journal of Power and Energy Conversion 1, no. 2/3 (2009): 300. http://dx.doi.org/10.1504/ijpec.2009.027949.
Full textde Vuyst, Bruno, and Alea Fairchild. "Legal and Economic Justification for Software Protection." International Journal of Open Source Software and Processes 4, no. 3 (July 2012): 1–12. http://dx.doi.org/10.4018/ijossp.2012070101.
Full textSuslina, Irina, and Valeriya Tarasova. "Law Protection of Computer Programs in the State of Israel." Tirosh. Jewish, Slavic & Oriental Studies 18 (2018): 206–18. http://dx.doi.org/10.31168/2658-3380.2018.18.4.2.
Full textNOYA, Yoichi, Shozi MASUKO, Toshiyuki OHNISHI, and Sigeru KASAHARA. "Utilization of a Computer Using Spreadsheet Software for Radiation Protection Management." RADIOISOTOPES 41, no. 11 (1992): 577–80. http://dx.doi.org/10.3769/radioisotopes.41.11_577.
Full textKingston, David. "Computer Software Reviews. Environmental Protection Agency's Sampling and Analysis Methods Database." Journal of Chemical Information and Modeling 32, no. 5 (September 1, 1992): 573–74. http://dx.doi.org/10.1021/ci00009a605.
Full textPugh, Edward Bryn. "Legal protection of computer software against misuse ? Feasibility or fond hope?" Liverpool Law Review 9, no. 1 (March 1987): 45–67. http://dx.doi.org/10.1007/bf01207249.
Full textWibisurya, Aswin, and Timothy Yudi Adinugroho. "A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption." ComTech: Computer, Mathematics and Engineering Applications 5, no. 2 (December 1, 2014): 647. http://dx.doi.org/10.21512/comtech.v5i2.2215.
Full textConeby, Randy, and Fred Gallegos. "Software Protection Techniques: Control Issues for is Auditors." EDPACS 27, no. 10 (April 2000): 1–12. http://dx.doi.org/10.1201/1079/43256.27.10.20000401/30326.1.
Full textMerling, Daniel, Steffen Lindner, and Michael Menth. "Robust LFA Protection for Software-Defined Networks (RoLPS)." IEEE Transactions on Network and Service Management 18, no. 3 (September 2021): 2570–86. http://dx.doi.org/10.1109/tnsm.2021.3090843.
Full textFreed, Roy N. "Legal protection of software—a global view from Japan." International Review of Law, Computers & Technology 4, no. 1 (January 1989): 71–78. http://dx.doi.org/10.1080/13600869.1989.9966279.
Full textCash, B. "The Last Place in the World - Copyright Protection for Computer Software in New Zealand." Victoria University of Wellington Law Review 27, no. 3 (November 3, 1997): 391. http://dx.doi.org/10.26686/vuwlr.v27i3.6109.
Full textDedman, Richard. "Legal protection of software in the United Kingdom." Computer Law & Security Review 3, no. 5 (January 1988): 10–14. http://dx.doi.org/10.1016/0267-3649(88)90107-0.
Full textGuifeng, Shi, Ouyang Lingnan, and Zhang Qingsheng. "Policies of software protection: The practice of China." Computer Law & Security Review 21, no. 4 (January 2005): 338–43. http://dx.doi.org/10.1016/j.clsr.2005.06.012.
Full textMay, J., G. Hughes, and A. D. Lunn. "Reliability estimation from appropriate testing of plant protection software." Software Engineering Journal 10, no. 6 (1995): 206. http://dx.doi.org/10.1049/sej.1995.0026.
Full textYan, Ke. "A Practical Method for Software Encryption." Applied Mechanics and Materials 571-572 (June 2014): 535–38. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.535.
Full textEsteve, Asuncion. "Patent Protection of Computer-Implemented Inventions Vis-A-Vis Open Source Software." Journal of World Intellectual Property 9, no. 3 (May 2006): 276–300. http://dx.doi.org/10.1111/j.1422-2213.2006.00278.x.
Full textNeophytou, J. P. "How will the scope of protection afforded to computer software be defined?" Journal of Intellectual Property Law & Practice 5, no. 12 (November 1, 2010): 837–39. http://dx.doi.org/10.1093/jiplp/jpq156.
Full textHinshaw, M. Joseph. "The role of standardization and interoperability in copyright protection of computer software." Communication Law and Policy 4, no. 3 (June 1999): 299–323. http://dx.doi.org/10.1080/10811689909368680.
Full text