Results 91 to 100 of about 50,028 (274)
Creation of Automatic Protection System for Executable Files under OS Linux
The main goal of this work is the creation of the automatic protection system for executable files under OS Linux. Existing automatic protection systems for executable files and their functional properties are analyzed.
D. M. Timovsky
doaj
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +1 more source
Plastin‐2 (PLS2) is identified as a dual‐function receptor on DCs that mediates both nanoparticle uptake and immunomodulation. A nanobody‐LNP platform is engineered to integrate antigen delivery with relicensing DCs. The therapeutic strategy elicits potent anti‐tumor T cell responses and leads to significant inhibition of established tumors in vivo ...
Shugang Qin +9 more
wiley +1 more source
Automatic Deobfuscation of VM-protected Programs
This paper is devoted to the technique for automatic deobfuscation of VM-protected programs. It is based on symbolic execution and abstract interpretation and takes into account protection specific.
Evgenyi Ivanovich Goncharov
doaj
Search, Obfuscation, and Price Elasticities on the Internet [PDF]
We examine the competition between a group of Internet retailers that operate in an environment where a price search engine plays a dominant role. We show that for some products in this environment, the easy price search makes demand tremendously price ...
Glenn Ellison, Sara Fisher Ellison
core
The Faraday Scalpel: Electrochemical Nerve Lesioning Mechanisms Studied in Invertebrate Models
Direct‐current produces nerve lesioning through discrete electrochemical reactions. Using hypoxia‐sensitive locust nerves and hypoxia‐tolerant leech nerves, we map three injury pathways: cathodic oxygen reduction, cathodic alkalization, and anodic chloride oxidation. These findings establish electrochemical lesioning—the “Faraday Scalpel”—as a precise,
Petra Ondráčková +5 more
wiley +1 more source
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
Preserving Location Privacy in Spatial Crowdsourcing Under Quality Control
Emerging spatial crowdsourcing (SC) provides an approach for collecting and analyzing spatiotemporal information from intelligent transportation systems.
Xiang Chu +3 more
doaj +1 more source
Impedance of Nonelectroneutral Solid Electrolyte Interphases With Nanopores: A Theoretical Model
Physical modeling reveals that often‐neglected non‐electroneutrality and nanopores in the solid‐electrolyte interphase (SEI) govern the impedance behavior. Under nonreactive conditions, the low‐frequency constant‐phase element (CPE) phenomenon can be attributed to the nonelectroneutral local conditions in the SEI.
Chenkun Li, Jun Huang
wiley +1 more source
On the Difficulty of FSM-based Hardware Obfuscation
In today’s Integrated Circuit (IC) production chains, a designer’s valuable Intellectual Property (IP) is transparent to diverse stakeholders and thus inevitably prone to piracy.
Marc Fyrbiak +6 more
doaj +1 more source

