共 50 条
- [23] Methods and Software for the Program Obfuscation SIBCON-2009: INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS, 2009, : 113 - 115
- [24] Security Analysis of Logic Obfuscation 2012 49TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2012, : 83 - 89
- [25] Q-Learning: From Computer Network Security To Software Security 2014 13TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2014, : 257 - 262
- [26] Software Security Knowledge Transferring and Learning with Concept Maps 2018 2ND INTERNATIONAL CONFERENCE ON E-SOCIETY, E-EDUCATION AND E-TECHNOLOGY (ICSET 2018), 2018, : 51 - 55
- [27] Creating a computer security curriculum in a software engineering program ICSE 2007: 29th International Conference on Software Engineering, Proceedings, 2007, : 732 - 735
- [28] Evaluation and selection of security products for authentication of computer software OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES III, 2000, 3973 : 62 - 65
- [29] Indistinguishability Obfuscation from Circular Security STOC '21: PROCEEDINGS OF THE 53RD ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2021, : 736 - 749
- [30] Applications of homomorphic functions to software obfuscation INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 152 - 153