Jasvir Nagra

Affiliations:
  • University of Auckland, New Zealand


According to our database1, Jasvir Nagra authored at least 13 papers between 2002 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
SoK: Applying Machine Learning in Security - A Survey.
CoRR, 2016

2012
Distributed application tamper detection via continuous software updates.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Automated Analysis of Security-Critical JavaScript APIs.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection.
Addison-Wesley Software Security Series, Addison-Wesley, ISBN: 978-0-321-54925-9, 2010

2009
Trading-off security and performance in barrier slicing for remote software entrusting.
Autom. Softw. Eng., 2009

The effectiveness of source code obfuscation: An experimental assessment.
Proceedings of the 17th IEEE International Conference on Program Comprehension, 2009

2008
Distributing Trust Verification to Increase Application Performance.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

Towards experimental evaluation of code obfuscation techniques.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
Barrier Slicing for Remote Software Trusting.
Proceedings of the Seventh IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2007), September 30, 2007

2004
Threading Software Watermarks.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Tamper-proo ng Software Watermarks.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

2003
A System for Graph-Based Visualization of the Evolution of Software.
Proceedings of the Proceedings ACM 2003 Symposium on Software Visualization, 2003

2002
A Functional Taxonomy for Software Watermarking.
Proceedings of the Computer Science 2002, 2002


  Loading...