Results 81 to 90 of about 26,866 (284)

An Android Malicious Code Detection Method Based on Improved DCA Algorithm

open access: yesEntropy, 2017
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang   +5 more
doaj   +1 more source

Language and Obfuscation Oblivious Source Code Authorship Attribution

open access: yesIEEE Access, 2020
Source Code Authorship Attribution can answer many interesting questions such as: Who wrote the malicious source code? Is the source code plagiarized, and does it infringe on copyright?
Sarim Zafar   +3 more
doaj   +1 more source

Ontogeny of the malleus in Mesocricetus auratus (Mammalia, Rodentia): Systematic and functional implications for the muroid middle ear

open access: yesThe Anatomical Record, EarlyView.
Abstract The three mammalian auditory ossicles enhance sound transmission from the tympanic membrane to the inner ear. The anterior anchoring of the malleus is one of the key characters for functional classification of the auditory ossicles. Previous studies revealed a medial outgrowth of the mallear anterior process, the processus internus ...
Franziska Fritzsche   +2 more
wiley   +1 more source

But how does it smell? An investigation of olfactory bulb size among living and fossil primates and other euarchontoglirans

open access: yesThe Anatomical Record, EarlyView.
Analysis of cranial endocast data of 181 extant and 41 fossil species from Euarchontoglires shows that there was a reduction in olfactory bulb size in Crown Primates, but that there were also subsequent reductions in various other primate clades (Anthropoidea, Catarrhini, Platyrrhini, crown Cercopithecoidea, Hominoidea).
Madlen Maryanna Lang   +6 more
wiley   +1 more source

The method of generation program code with indistinguishable functionality

open access: yesБезопасность информационных технологий, 2017
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input.
Mikhail Andreevich Styugin
doaj   +1 more source

Deobfuscation, unpacking, and decoding of obfuscated malicious JavaScript for machine learning models detection performance improvement

open access: yesCAAI Transactions on Intelligence Technology, 2020
Obfuscation is rampant in both benign and malicious JavaScript (JS) codes. It generates an obscure and undetectable code that hinders comprehension and analysis. Therefore, accurate detection of JS codes that masquerade as innocuous scripts is vital. The
Samuel Ndichu   +3 more
doaj   +1 more source

The paper puzzle as an active learning tool in the teaching of anatomy: A qualitative study of perceptions in students and near‐peer teachers

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Active learning strategies enhance medical education by fostering self‐directed learning, communication, and problem‐solving skills. The paper puzzle, a game‐based learning approach, provides an engaging way to reinforce anatomical knowledge and promote collaboration.
Ricardo Tello‐Mendoza   +6 more
wiley   +1 more source

The Effectiveness Of Bytecode Decompilation [PDF]

open access: yes
High-level bytecodes used by object-oriented managed execution environments make it easy to decompile them. This paper studies the reasons that make bytecode decompilers such efficient and presents basic obfuscation techniques as an efficient protection ...
Robert Enyedi
core  

Beyond Kahoot! Reflections and guidelines from a serial gamifying educator on when and how to effectively use games and game elements in anatomical education

open access: yesAnatomical Sciences Education, EarlyView.
Abstract According to Nietzsche, “In every real [adult], a child is hidden that wants to play.” In everyday life, playfulness and competition can make routine or dull tasks more engaging and can offer educators opportunities to engage a learner in a more entertaining or interactive manner.
Judi Laprade
wiley   +1 more source

Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]

open access: yes, 2018
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca   +1 more
core  

Home - About - Disclaimer - Privacy