Results 261 to 270 of about 50,028 (274)
Some of the next articles are maybe not open access.
The influence of connotation on readability and obfuscation in Australian chairman addresses
Managerial Auditing Journal, 2011Leopold Bayerlein
exaly
AndrODet: An adaptive Android obfuscation detector
Future Generation Computer Systems, 2019Omid Mirzaei +2 more
exaly
Spatial obfuscation methods for privacy protection of household-level data
Applied Geography, 2015Dara E Seidl +2 more
exaly
From Obfuscation to Comprehension
2015 IEEE 23rd International Conference on Program Comprehension, 2015Eran Avidan, Dror G. Feitelson
openaire +1 more source
Diversification and obfuscation techniques for software security: A systematic literature review
Information and Software Technology, 2018Shohreh Hosseinzadeh +2 more
exaly
Control flow obfuscation for Android applications
Computers and Security, 2016Vivek Balachandran
exaly
An Overview of FPGA-inspired Obfuscation Techniques
ACM Computing SurveysZain Ul Abideen +2 more
exaly

