Results 231 to 240 of about 26,866 (284)
Attribution classification method of APT malware based on multi-feature fusion. [PDF]
Zhang J, Liu S, Liu Z.
europepmc +1 more source
Hidden in plain sight: antisemitic content in QAnon subreddits. [PDF]
Weinberg DB +9 more
europepmc +1 more source
MSSA: multi-stage semantic-aware neural network for binary code similarity detection. [PDF]
Wan B, Zhou J, Wang Y, Chen F, Qian Y.
europepmc +1 more source
A location semantic privacy protection model based on spatial influence. [PDF]
Kuang L, Shi W, Chen X, Zhang J, Liao H.
europepmc +1 more source
Weaving Political Identities: Jean‐Luc Nancy, Empedocles, and (the Later) Plato
Constellations, EarlyView.
Benjamin Hutchens
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Data Hiding Using Code Obfuscation
Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021Digital transformation of many companies and government administrations, now accelerated by the pandemic, provides cybercriminals an increased opportunity of incorporating various types of information hiding techniques into the malicious software and by that perform different types of attacks.
Pawel Rajba, Wojciech Mazurczyk
openaire +1 more source
2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us
Pratik Kanani +4 more
openaire +1 more source
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us
Pratik Kanani +4 more
openaire +1 more source
Obfuscated Code Quality Measurement
2019 XXIX International Scientific Symposium "Metrology and Metrology Assurance" (MMA), 2019Nowadays, number of cyber-attacks aimed at software increases. Thus, improving the quality of software security services becomes acute. Confidentiality is one of the basic security services. It is provided, including through the use of obfuscation mechanism. Code quality measurement Methods has been investigated. Particular attention is paid to methods
Serhii Semenov +2 more
openaire +1 more source

