-
1Academic Journal
المؤلفون: Ceccato, Mariano, Tonella, Paolo, Basile, Cataldo, Falcarin, Paolo, Torchiano, Marco, Coppens, Bart, De Sutter, Bjorn
المساهمون: Ceccato, Mariano, Tonella, Paolo, Basile, Cataldo, Falcarin, Paolo, Torchiano, Marco, Coppens, Bart, De Sutter, Bjorn
مصطلحات موضوعية: Software protection, Software hacking, Attack proce, Attack model, Attack taxonomy, Empirical study, Hacker model, Reverse engineering, Analysis tool, Code understanding, Defeat protections
وصف الملف: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000458634400009; volume:24; issue:1; firstpage:240; lastpage:286; numberofpages:47; journal:EMPIRICAL SOFTWARE ENGINEERING; info:eu-repo/grantAgreement/EC/FP7/609734; http://hdl.handle.net/11562/1013347; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85047389289
-
2Academic Journal
المؤلفون: Ceccato, Mariano, Tonella, Paolo, Basile, Cataldo, Falcarin, Paolo, Torchiano, Marco, Coppens, Bart, De Sutter, Bjorn
المساهمون: Ceccato, Mariano, Tonella, Paolo, Basile, Cataldo, Falcarin, Paolo, Torchiano, Marco, Coppens, Bart, De Sutter, Bjorn
مصطلحات موضوعية: Software protection, Software hacking, Attack proce, Attack model, Attack taxonomy, Empirical study, Hacker model, Reverse engineering, Analysis tool, Code understanding, Defeat protections, Settore ING-INF/05 - Sistemi di Elaborazione delle Informazioni
وصف الملف: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000458634400009; volume:24; issue:1; firstpage:240; lastpage:286; numberofpages:47; journal:EMPIRICAL SOFTWARE ENGINEERING; info:eu-repo/grantAgreement/EC/FP7/ASPIRE; http://hdl.handle.net/10278/3743230; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85047389289; https://rdcu.be/Piqb
-
3Academic Journal
المؤلفون: Ceccato, Mariano, Tonella, Paolo, Basile, Cataldo, Falcarin, Paolo, Torchiano, Marco, Coppens, Bart, De Sutter, Bjorn
المساهمون: Ceccato, Mariano, Tonella, Paolo, Basile, Cataldo, Falcarin, Paolo, Torchiano, Marco, Coppens, Bart, De Sutter, Bjorn
مصطلحات موضوعية: Software protection, Software hacking, Attack proce, Attack model, Attack taxonomy, Empirical study, Hacker model, Reverse engineering, Analysis tool, Code understanding, Defeat protection
وصف الملف: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000458634400009; volume:24; issue:1; firstpage:240; lastpage:286; numberofpages:47; journal:EMPIRICAL SOFTWARE ENGINEERING; info:eu-repo/grantAgreement/EC/FP7/ASPIRE (grant no. 609734); http://hdl.handle.net/11583/2709155; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85047389289; https://rdcu.be/Piqb