File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Heap graph based software theft detection

TitleHeap graph based software theft detection
Authors
Issue Date2013
Citation
IEEE Transactions on Information Forensics and Security, 2013, v. 8 n. 1, p.101-110 How to Cite?
Persistent Identifierhttp://hdl.handle.net/10722/190316
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorChan, PCKen_US
dc.contributor.authorHui, CKen_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2013-09-17T15:18:33Z-
dc.date.available2013-09-17T15:18:33Z-
dc.date.issued2013en_US
dc.identifier.citationIEEE Transactions on Information Forensics and Security, 2013, v. 8 n. 1, p.101-110en_US
dc.identifier.urihttp://hdl.handle.net/10722/190316-
dc.languageengen_US
dc.relation.ispartofIEEE Transactions on Information Forensics and Securityen_US
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.titleHeap graph based software theft detectionen_US
dc.typeArticleen_US
dc.identifier.emailHui, CK: hui@cs.hku.hken_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hken_US
dc.identifier.authorityHui, CK=rp00120en_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1109/TIFS.2012.2223685-
dc.identifier.hkuros223599en_US
dc.identifier.volume8en_US
dc.identifier.issue1en_US
dc.identifier.spage101en_US
dc.identifier.epage110en_US
dc.identifier.isiWOS:000318595000009-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats