[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/conf/cybersecpods/ZhangFGITSD16>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Bjorn_De_Sutter>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Christophe_Tartary>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Elena_G%E2%88%9A%E2%89%A5mez-Mart%E2%88%9A%E2%89%A0nez>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Gaofeng_Zhang>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/J%E2%88%9A%C2%A9r%E2%88%9A%C4%ABme_d%27Annoville>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Paolo_Falcarin>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Shareeful_Islam>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1109%2FCyberSecPODS.2016.7502352>
foaf:homepage <https://doi.org/10.1109/CyberSecPODS.2016.7502352>
dc:identifier DBLP conf/cybersecpods/ZhangFGITSD16 (xsd:string)
dc:identifier DOI doi.org%2F10.1109%2FCyberSecPODS.2016.7502352 (xsd:string)
dcterms:issued 2016 (xsd:gYear)
rdfs:label Attack simulation based software protection assessment method. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Bjorn_De_Sutter>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Christophe_Tartary>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Elena_G%E2%88%9A%E2%89%A5mez-Mart%E2%88%9A%E2%89%A0nez>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Gaofeng_Zhang>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/J%E2%88%9A%C2%A9r%E2%88%9A%C4%ABme_d%27Annoville>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Paolo_Falcarin>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Shareeful_Islam>
swrc:pages 1-8 (xsd:string)
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/conf/cybersecpods/2016>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/conf/cybersecpods/ZhangFGITSD16/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/conf/cybersecpods/ZhangFGITSD16>
rdfs:seeAlso <http://dblp.uni-trier.de/db/conf/cybersecpods/cybersecpods2016.html#ZhangFGITSD16>
rdfs:seeAlso <https://doi.org/10.1109/CyberSecPODS.2016.7502352>
swrc:series <https://dblp.l3s.de/d2r/resource/conferences/cybersecpods>
dc:title Attack simulation based software protection assessment method. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InProceedings
rdf:type foaf:Document