Results 111 to 120 of about 27,012 (180)

Adaptive malware identification via integrated SimCLR and GRU networks. [PDF]

open access: yesSci Rep
Alsubaei FS   +5 more
europepmc   +1 more source

Platform Independent Code Obfuscation

open access: yes, 2013
Code obfuscation is a technique used to make soft- ware more difficult to read and reverse engineer. It is used in the industry to protect proprietary algo- rithms and to protect the software from unintended use. The current state of the art solutions in the in- dustry depend on specific platform targets.
openaire   +2 more sources

Epidemiological trends and indications of shoulder arthroscopy among 191,549 patients in the United States. [PDF]

open access: yesShoulder Elbow
Burkhart RJ   +9 more
europepmc   +1 more source

Transfer learning with XAI for robust malware and IoT network security. [PDF]

open access: yesSci Rep
Almadhor A   +6 more
europepmc   +1 more source

A graph attention network-based multi-agent reinforcement learning framework for robust detection of smart contract vulnerabilities. [PDF]

open access: yesSci Rep
Adjei PK   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy