Results 91 to 100 of about 776,400 (220)

Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques

open access: yesJournal of Computer Science and Technology, 2008
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj  

Hardware Validation for Semi-Coherent Transmission Security

open access: yesInformation
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority.
Michael Fletcher   +2 more
doaj   +1 more source

Human tests for machine models: What lies “Beyond the Imitation Game”?

open access: yesJournal of Linguistic Anthropology, Volume 36, Issue 1, May 2026.
Abstract Benchmarking large language models (LLMs) is a key practice for evaluating their capabilities and risks. This paper considers the development of “BIG Bench,” a crowdsourced benchmark designed to test LLMs “Beyond the Imitation Game.” Drawing on linguistic anthropological and ethnographic analysis of the project's GitHub repository, we examine ...
Noya Kohavi, Anna Weichselbraun
wiley   +1 more source

Hardware Obfuscation Driven by QR Pattern using High Level Transformations

open access: yesInternational Journal of Advanced Trends in Computer Science and Engineering, 2019
This paper presents QR pattern enabled key driven approach for mitigating piracy problem over any digital design, hardware security and reverse engineering (RE) by obfuscation process.
Sharath Kumar D.R.V.A
semanticscholar   +1 more source

Datasheets for machine learning sensors

open access: yesAI Magazine, Volume 47, Issue 1, Spring 2026.
Abstract Machine learning (ML) is becoming prevalent in embedded AI sensing systems. These “ML sensors” enable context‐sensitive, real‐time data collection and decision‐making across diverse applications ranging from anomaly detection in industrial settings to wildlife tracking for conservation efforts.
Matthew Stewart   +14 more
wiley   +1 more source

Scaling‐Aware Rating of Poisson‐Limited Demand Forecasts

open access: yesJournal of Forecasting, Volume 45, Issue 2, Page 787-805, March 2026.
ABSTRACT Forecast quality should be assessed in the context of what is possible in theory and what is reasonable to expect in practice. Often, one can identify an approximate upper bound to a probabilistic forecast's sharpness, which sets a lower, not necessarily achievable, limit to error metrics.
Malte C. Tichy   +4 more
wiley   +1 more source

Machine Learning and Deep Learning Approaches for SQL Injection Detection: A Review

open access: yesNTU Journal of Engineering and Technology
Structured Query Language Injection (SQLi) remains one of the most serious threats to web applications and has the ability to bypass traditional signature-based detection through obfuscation and zero-day payloads.
Sahar Saadallah Ahmed   +1 more
doaj   +1 more source

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

Cyclic Homomorphic Encryption Aggregation (CHEA)—A Novel Approach to Data Aggregation in the Smart Grid

open access: yesEnergies
The transactive energy market is an emerging development in energy economics built on advanced metering infrastructure. Data generated in this context is often required for market operations, while also being privacy sensitive.
Daniel Sousa-Dias   +4 more
doaj   +1 more source

Intraoperative Abdominal Penetration of the Lag Screw: A Rare Complication During Proximal Femoral Nail Anti‐Rotation Surgery

open access: yesClinical Case Reports, Volume 14, Issue 2, February 2026.
ABSTRACT Although the proximal femoral nail anti‐rotation (PFNA) is accompanied by several benefits, using the nail is technically challenging and may pose some errors, leading to osteosynthesis failure. Here, we report a critical presentation of an uncommon side effect of PFNA surgery.
Mohammad Javad Dehghani Firoozabadi   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy