Results 91 to 100 of about 50,028 (274)

Creation of Automatic Protection System for Executable Files under OS Linux

open access: yesБезопасность информационных технологий, 2010
The main goal of this work is the creation of the automatic protection system for executable files under OS Linux. Existing automatic protection systems for executable files and their functional properties are analyzed.
D. M. Timovsky
doaj  

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

A Nanobody‐LNP Platform for Targeting and Relicensing Dendritic Cells for Potent Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Plastin‐2 (PLS2) is identified as a dual‐function receptor on DCs that mediates both nanoparticle uptake and immunomodulation. A nanobody‐LNP platform is engineered to integrate antigen delivery with relicensing DCs. The therapeutic strategy elicits potent anti‐tumor T cell responses and leads to significant inhibition of established tumors in vivo ...
Shugang Qin   +9 more
wiley   +1 more source

Automatic Deobfuscation of VM-protected Programs

open access: yesБезопасность информационных технологий, 2013
This paper is devoted to the technique for automatic deobfuscation of VM-protected programs. It is based on symbolic execution and abstract interpretation and takes into account protection specific.
Evgenyi Ivanovich Goncharov
doaj  

Search, Obfuscation, and Price Elasticities on the Internet [PDF]

open access: yes
We examine the competition between a group of Internet retailers that operate in an environment where a price search engine plays a dominant role. We show that for some products in this environment, the easy price search makes demand tremendously price ...
Glenn Ellison, Sara Fisher Ellison
core  

The Faraday Scalpel: Electrochemical Nerve Lesioning Mechanisms Studied in Invertebrate Models

open access: yesAdvanced Science, EarlyView.
Direct‐current produces nerve lesioning through discrete electrochemical reactions. Using hypoxia‐sensitive locust nerves and hypoxia‐tolerant leech nerves, we map three injury pathways: cathodic oxygen reduction, cathodic alkalization, and anodic chloride oxidation. These findings establish electrochemical lesioning—the “Faraday Scalpel”—as a precise,
Petra Ondráčková   +5 more
wiley   +1 more source

Temperature‐Resilient Reconfigurable Physical Unclonable Function Driven by Pulse Modulation Using CMOS‐Integrated Spintronic Chips

open access: yesAdvanced Science, EarlyView.
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang   +7 more
wiley   +1 more source

Preserving Location Privacy in Spatial Crowdsourcing Under Quality Control

open access: yesIEEE Access, 2019
Emerging spatial crowdsourcing (SC) provides an approach for collecting and analyzing spatiotemporal information from intelligent transportation systems.
Xiang Chu   +3 more
doaj   +1 more source

Impedance of Nonelectroneutral Solid Electrolyte Interphases With Nanopores: A Theoretical Model

open access: yesAdvanced Science, EarlyView.
Physical modeling reveals that often‐neglected non‐electroneutrality and nanopores in the solid‐electrolyte interphase (SEI) govern the impedance behavior. Under nonreactive conditions, the low‐frequency constant‐phase element (CPE) phenomenon can be attributed to the nonelectroneutral local conditions in the SEI.
Chenkun Li, Jun Huang
wiley   +1 more source

On the Difficulty of FSM-based Hardware Obfuscation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy