{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:11:30Z","timestamp":1730279490889,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/iwcmc.2015.7289205","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T18:02:15Z","timestamp":1444068135000},"page":"916-922","source":"Crossref","is-referenced-by-count":1,"title":["SensorWatermark: a scheme of software watermark using code obfuscation and tamperproofing for WSN"],"prefix":"10.1109","author":[{"given":"Emanuele N. de L. F.","family":"Jorge","sequence":"first","affiliation":[]},{"given":"Luci","family":"Pirmez","sequence":"additional","affiliation":[]},{"given":"Claudio M.","family":"de Farias","sequence":"additional","affiliation":[]},{"given":"Rafael de O.","family":"Costa","sequence":"additional","affiliation":[]},{"given":"Davidson R.","family":"Boccardo","sequence":"additional","affiliation":[]},{"given":"Luiz F. R. da C.","family":"Carmo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_15"},{"key":"ref11","article-title":"TinyWatermark: a code obfuscation-based software watermarking framework for wireless sensor networks","author":"jorge","year":"2014","journal-title":"International Conference on Wireless Networks Las Vegas Proceedings of the 2014 International Conference on Wireless Networks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.6.1.148-155"},{"journal-title":"Evaluating effectiveness of tamper proofing on dynamic graph software watermarks","year":"2010","author":"khiyal","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755722"},{"journal-title":"Transforma&#x00E7;&#x00F5;es de c&#x00F3;digo para prote&#x00E7;&#x00E3;o de software","year":"2010","author":"boccardo","key":"ref4"},{"journal-title":"Surreptitious Software","year":"2010","author":"collberg","key":"ref3"},{"key":"ref6","first-page":"68","article-title":"TinyObf: code obfuscation framework for wireless sensor networks","author":"costa","year":"2012","journal-title":"Proc International Conference on Wireless Networks (ICWN)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.6.4.329-340"},{"key":"ref8","first-page":"1791","article-title":"A method of software watermarking. In Systems and Informatics (ICSAI)","author":"xu","year":"2012","journal-title":"2012 International Conference"},{"key":"ref7","first-page":"583","article-title":"A novel algorithm for. NET programs watermarking based on obfuscation. In Instrumentation & Measurement, Sensor Network and Automation (IMSNA)","volume":"2","author":"chen","year":"2012","journal-title":"2012 IEEE International Symposium On"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-9884-z"},{"journal-title":"Copy protection through software watermarking and obfuscation","year":"2007","author":"eberhardt","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511626609"}],"event":{"name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2015,8,24]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7275105\/7288920\/07289205.pdf?arnumber=7289205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T23:36:31Z","timestamp":1490398591000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7289205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2015.7289205","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}