File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Heap graph based software theft detection

TitleHeap graph based software theft detection
Authors
KeywordsCode theft detection
heap graph
software birthmark
software protection
Issue Date2013
Citation
IEEE Transactions on Information Forensics and Security, 2013, v. 8 n. 1, p.101-110 How to Cite?
Persistent Identifierhttp://hdl.handle.net/10722/190316
ISSN
2021 Impact Factor: 7.231
2020 SCImago Journal Rankings: 1.613
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorChan, PCKen_US
dc.contributor.authorHui, CKen_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2013-09-17T15:18:33Z-
dc.date.available2013-09-17T15:18:33Z-
dc.date.issued2013en_US
dc.identifier.citationIEEE Transactions on Information Forensics and Security, 2013, v. 8 n. 1, p.101-110en_US
dc.identifier.issn1556-6013-
dc.identifier.urihttp://hdl.handle.net/10722/190316-
dc.languageengen_US
dc.relation.ispartofIEEE Transactions on Information Forensics and Securityen_US
dc.subjectCode theft detection-
dc.subjectheap graph-
dc.subjectsoftware birthmark-
dc.subjectsoftware protection-
dc.titleHeap graph based software theft detectionen_US
dc.typeArticleen_US
dc.identifier.emailHui, CK: hui@cs.hku.hken_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hken_US
dc.identifier.authorityHui, CK=rp00120en_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TIFS.2012.2223685-
dc.identifier.scopuseid_2-s2.0-84872120665-
dc.identifier.hkuros223599en_US
dc.identifier.volume8en_US
dc.identifier.issue1en_US
dc.identifier.spage101en_US
dc.identifier.epage110en_US
dc.identifier.eissn1556-6021-
dc.identifier.isiWOS:000318595000009-
dc.identifier.issnl1556-6013-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats