Results 201 to 210 of about 897,349 (250)

An artificial insurance framework for a hydrogen-based microgrid to detect the advanced cyberattack model. [PDF]

open access: yesSci Rep
Fakhrooeian M   +6 more
europepmc   +1 more source

Revisiting European social dialogue: A systematic literature review. [PDF]

open access: yesOpen Res Eur
Cárdenas Domínguez F   +2 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Code Obfuscation Based on Inline Split of Control Flow Graph

2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2021
Control flow graph is an important concept in the field of program analysis, which represents the source program in the form of graph. On the control flow graph, we can easily analyze the predecessor and successor relationship among basic blocks.
Yang Li   +3 more
semanticscholar   +1 more source

Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM

IEEJ Transactions on Industry Applications, 2019
Obfuscation is a method to conceal the structure and function of software. Obfuscator-LLVM (oLLVM) is a set of tools for software obfuscation, which is implemented as middle-end passes in an LLVM framework.
Yuumi Matsuoka   +2 more
semanticscholar   +1 more source

"Digital Camouflage": The LLVM Challenge in LLM-Based Malware Detection

Journal of Systems and Software
Large Language Models (LLMs) have emerged as promising tools for malware detection by analyzing code semantics, identifying vulnerabilities, and adapting to evolving threats.
Ekin Böke, Simon Torka
semanticscholar   +1 more source

Deconstructing Obfuscation: A four-dimensional framework for evaluating Large Language Models assembly code deobfuscation capabilities

arXiv.org
Large language models (LLMs) have shown promise in software engineering, yet their effectiveness for binary analysis remains unexplored. We present the first comprehensive evaluation of commercial LLMs for assembly code deobfuscation. Testing seven state-
Anton Tkachenko   +2 more
semanticscholar   +1 more source

Code Obfuscated Compilation Method Based on Mimic Defense

2025 International Conference on Computer Science, Technology and Engineering (ICCSTE)
Existing code obfuscation techniques introduce bogus control flow and string obfuscation to conceal program logic and hardcoded sensitive information but exhibit insufficient code semantic obfuscation and recognizable obfuscation patterns. To this end, a
Zhuo Wang   +5 more
semanticscholar   +1 more source

A Control Flow Integrity Checking Technique Based on Hardware Support

IEEE Advanced Information Technology, Electronic and Automation Control Conference, 2018
In this paper, we propose a new hardware-supported lightweight control flow integrity check method in RISC architecture processors, which resists code reuse attacks with negligible performance overhead without extending ISAs or modifying compile. The key
Yang Li, Z. Dai, Junwei Li
semanticscholar   +1 more source

Grasshopper optimization algorithm for optimal load frequency control considering Predictive Functional Modified PID controller in restructured multi-resource multi-area power system with Redox Flow Battery units

Control Engineering Practice, 2019
Load frequency control (LFC) is a well-established issue in design and operation of power systems considering to the extension, restructuring, and complexity of the interconnected power systems and also the emergence utilization of renewable energy ...
S. M. Nosratabadi   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy