Cited By
View all- Price S(2018)A Heuristic Search for Identifying Required Application Libraries Supporting a Run-Time Security PolicyInformation Security Journal: A Global Perspective10.1080/1939355090337595319:2(100-108)Online publication date: 15-Dec-2018
- Tao HChen Y(2018)A new metric model for trustworthiness of softwaresTelecommunications Systems10.1007/s11235-011-9420-951:2-3(95-105)Online publication date: 29-Dec-2018
- Chang CPotkonjak MZhang L(2016)Hardware IP Watermarking and FingerprintingSecure System Design and Trustable Computing10.1007/978-3-319-14971-4_10(329-368)Online publication date: 2016
- Show More Cited By