Software protection method based on monitoring attack threats
TANG Zhanyong, LI Zhen, ZHANG Cong, GONG Xiaoqing, FANG Dingyi
Journal of Computer Applications . 2017, (1): 120 -127 .  DOI: 10.11772/j.issn.1001-9081.2017.01.0120