Results 251 to 260 of about 50,028 (274)
Some of the next articles are maybe not open access.

Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks

IEEE Transactions on Information Forensics and Security, 2023
Likhitha Mankali   +2 more
exaly  

Lambda Obfuscation

2018
Pengwei Lan   +3 more
openaire   +1 more source

Obfuscation-Resilient Android Malware Analysis Based on Complementary Features

IEEE Transactions on Information Forensics and Security, 2023
Cuiying Gao, Minghui Cai, yin shuijun
exaly  

CLARIFICATION OR OBFUSCATION?

AJN, American Journal of Nursing, 1986
openaire   +2 more sources

Cryptographic Obfuscation

2020
Máté Horváth, Levente Buttyán
openaire   +1 more source

BLADE: Robust malware detection against obfuscation in android

Forensic Science International: Digital Investigation, 2021
Vikas Sihag, Manu Vardhan, Pradeep Singh
exaly  

Turing Obfuscation

2018
Yan Wang   +3 more
openaire   +1 more source

Protecting Software through Obfuscation

ACM Computing Surveys, 2017
Sebastian Schrittwieser   +2 more
exaly  

Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits

SIAM Journal on Computing, 2016
Shai Halevi, Mariana Raykova, Amit Sahai
exaly  

Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design

IEEE Transactions on Information Forensics and Security, 2018
Sandhya Koteshwara   +2 more
exaly  

Home - About - Disclaimer - Privacy