Results 91 to 100 of about 27,012 (180)

ASPECT-ORIENTED CODE OBFUSCATION

open access: yesSoftware Technology and Engineering, 2009
Aspect-oriented code obfuscation, Proceedings of the 2009 International Conference on Software Technology and Engineering Chennai, India pp. 252-257.
openaire   +2 more sources

Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques

open access: yesJournal of Computer Science and Technology, 2008
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj  

Software deobfuscation methods: analysis and implementation

open access: yesТруды Института системного программирования РАН, 2018
This paper describes the work on development of the deobfuscation software. The main target of the developed software is the analysis of the obfuscated malware code.
Sh. F. Kurmangaleev   +5 more
doaj  

Context matching is not reasoning when performing generalized clinical evaluation of generative language models. [PDF]

open access: yesNPJ Digit Med
Wen A   +14 more
europepmc   +1 more source

Medical data sharing and synthetic clinical data generation - maximizing biomedical resource utilization and minimizing participant re-identification risks. [PDF]

open access: yesNPJ Digit Med
Marino S   +11 more
europepmc   +1 more source

Graph-augmented multi-modal learning framework for robust android malware detection. [PDF]

open access: yesSci Rep
Tanveer MU   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy