Results 251 to 260 of about 1,981,488 (283)
Some of the next articles are maybe not open access.
Software protection and software piracy
The Journal of World Intellectual Property, 2022AbstractThis paper explores the dynamic long‐term relationship between software protection and software piracy rates across 108 countries over the period of 20 years (1994–2015), with the help of the ARDL model. The analysis employs a new way of utilising the membership duration of Trade related Intellectual Property Rights agreement and World ...
Amit Kumar Jha, Priyanka Rajan
openaire +1 more source
Hardware/software IP protection
Proceedings of the 37th conference on Design automation - DAC '00, 2000Design methodologies based on reuse of intellectual property (IP) components critically depend on techniques to protect IP ownership. IP protection is particularly challenging for hardware/software systems, where an IP core runs embedded software: both the software and the core are valuable IP that must be protected.We propose a new technique for ...
DALPASSO, MARCELLO +2 more
openaire +2 more sources
Software for tabular data protection
Statistics in Medicine, 2005AbstractIn order for national statistical offices to maintain the trust of the public to collect data and publish statistics of importance to society and decision‐making, it is imperative that respondents (persons or establishments) be guaranteed privacy and confidentiality in return for providing requested confidential data.
Joe Fred, Gonzalez, Lawrence H, Cox
openaire +2 more sources
Rethinking Software Protection
2021Abstract The core of artificial intelligence (AI) applications is software of one sort or another. But while available data and computing power are important for the recent quantum leap in AI, there would not be any AI without computer programs or software.
openaire +1 more source
Gurukul International Multidisciplinary Research Journal
ABSTRACT : Software piracy has been major issue for software industries. Piracy has become so prevalent over the Internet that poses a major threat to software product companies. With the help of malicious codes and programs, hackers or an intruder can gain access to Software the system and steal the information.
openaire +1 more source
ABSTRACT : Software piracy has been major issue for software industries. Piracy has become so prevalent over the Internet that poses a major threat to software product companies. With the help of malicious codes and programs, hackers or an intruder can gain access to Software the system and steal the information.
openaire +1 more source
Copyright Protection for Software Written By Software
Computer Law Review International, 2011Abstract A previous article in this journal by the Belgian lawyer Joren De Wachter (CRi 2010, 12-20) discussed ‘software written by software’, and questioned whether a copyright analysis is appropriate and workable in such cases. In this article, deWachter’s views are critiqued by English lawyers who believe that copyright remains ...
Mark Paton, Jeremy Morton
openaire +1 more source
Data Processing, 1984
Abstract Software piracy is a problem not only for suppliers of software but also for DP departments where confidentiality of information is vital. The article discusses the approach of both micro and mainframe software suppliers to software protection.
openaire +1 more source
Abstract Software piracy is a problem not only for suppliers of software but also for DP departments where confidentiality of information is vital. The article discusses the approach of both micro and mainframe software suppliers to software protection.
openaire +1 more source
2013
Industrial Control System (ICS) cyber security is weak and exploitable. As evidenced by STUXNET’s attack on the Iranian Natanz1 nuclear facility in 2010 and others since global critical infrastructure is in danger of cyber attack. The problem stems from the growth of industrial management systems over three distinct generations that moved process ...
openaire +1 more source
Industrial Control System (ICS) cyber security is weak and exploitable. As evidenced by STUXNET’s attack on the Iranian Natanz1 nuclear facility in 2010 and others since global critical infrastructure is in danger of cyber attack. The problem stems from the growth of industrial management systems over three distinct generations that moved process ...
openaire +1 more source
SOFTWARE PROTECTION FOR MICROCOMPUTERS
Cryptologia, 1984The most popular microcomputers have serious security weaknesses. Their password protection gives no protection at all against anyone skilled in the art of systems programming. The system described relies upon file encryption. It is implemented entirely in software and affords moderate security without incurring high over-head or memory residence costs.
JOHN M. CARROLL, PIERRE G. LAURIN
openaire +1 more source
Gurukul International Multidisciplinary Research Journal
ABSTRACT : Software piracy has been major issue for software industries. Piracy has become so prevalent over the Internet that poses a major threat to software product companies. With the help of malicious codes and programs, hackers or an intruder can gain access to Software the system and steal the information.
openaire +1 more source
ABSTRACT : Software piracy has been major issue for software industries. Piracy has become so prevalent over the Internet that poses a major threat to software product companies. With the help of malicious codes and programs, hackers or an intruder can gain access to Software the system and steal the information.
openaire +1 more source

