Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nagra, Jasvir
add a person with the name Nagra, Jasvir
 

Other publications of authors with the same name

Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection., and . Addison-Wesley Software Security Series Addison-Wesley, (2010)A System for Graph-Based Visualization of the Evolution of Software., , , , and . SOFTVIS, page 77-86. ACM, (2003)Distributed application tamper detection via continuous software updates., , , and . ACSAC, page 319-328. ACM, (2012)Threading Software Watermarks., and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 208-223. Springer, (2004)Trading-off security and performance in barrier slicing for remote software entrusting., , , , and . Autom. Softw. Eng., 16 (2): 235-261 (2009)Towards experimental evaluation of code obfuscation techniques., , , , , , and . QoP, page 39-46. ACM, (2008)The effectiveness of source code obfuscation: An experimental assessment., , , , , , and . ICPC, page 178-187. IEEE Computer Society, (2009)SoK: Applying Machine Learning in Security - A Survey., , and . CoRR, (2016)A Functional Taxonomy for Software Watermarking., , and . ACSC, volume 4 of CRPIT, page 177-186. Australian Computer Society, (2002)Tamper-proo ng Software Watermarks., , , and . ACSW, volume 32 of CRPIT, page 27-36. Australian Computer Society, (2004)