Method to Evaluate Software Protection Based on Attack Modeling

Huaijun Wang, Dingyi Fang, Ni Wang, Zhanyong Tang, Feng Chen, Yuanxiang Gu. Method to Evaluate Software Protection Based on Attack Modeling. In 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, HPCC/EUC 2013, Zhangjiajie, China, November 13-15, 2013. pages 837-844, IEEE, 2013. [doi]

@inproceedings{WangFWTCG13,
  title = {Method to Evaluate Software Protection Based on Attack Modeling},
  author = {Huaijun Wang and Dingyi Fang and Ni Wang and Zhanyong Tang and Feng Chen and Yuanxiang Gu},
  year = {2013},
  doi = {10.1109/HPCC.and.EUC.2013.120},
  url = {http://dx.doi.org/10.1109/HPCC.and.EUC.2013.120},
  researchr = {https://researchr.org/publication/WangFWTCG13},
  cites = {0},
  citedby = {0},
  pages = {837-844},
  booktitle = {10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, HPCC/EUC 2013, Zhangjiajie, China, November 13-15, 2013},
  publisher = {IEEE},
}