Results 221 to 230 of about 50,028 (274)

The DIKW of Transcriptomics in Ecotoxicology: Extracting Information, Knowledge, and Wisdom From Big Data

open access: yes
Environmental Toxicology and Chemistry, EarlyView.
Jessica A. Head   +2 more
wiley   +1 more source

Proactive obfuscation

ACM Transactions on Computer Systems, 2010
Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh versions.
Roeder, Tom, Schneider, Fred B.
openaire   +1 more source

Data Flow Obfuscation: A New Paradigm for Obfuscating Circuits

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2021
In this article, unlike almost all state-of-the-art obfuscation solutions that focus on functional/logic obfuscation, we introduce a new paradigm, called data flow obfuscation, which exploits the essence of asynchronicity. In data flow obfuscation, by benefiting from the handshaking mechanism of asynchronous circuits, the system’s FFs/latches will ...
Kimia Zamiri Azar   +5 more
openaire   +1 more source

The Obfuscation Executive

2004
Code obfuscations are semantics-preserving code transfor- mations used to protect a program from reverse engineering. There is gen- erally no expectation of complete, long-term, protection. Rather, there is a trade-off between the protection afforded by an obfuscation (i.e.
Kelly Heffner, Christian S. Collberg
openaire   +1 more source

Home - About - Disclaimer - Privacy