Results 41 to 50 of about 49,594 (257)

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]

open access: yes, 2018
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco   +2 more
core   +2 more sources

Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient

open access: yesEntropy, 2023
Quantum obfuscation is one of the important primitives in quantum cryptography that can be used to enhance the security of various quantum cryptographic schemes.
Yazhuo Jiang   +3 more
doaj   +1 more source

Applying an Ethical Lens to the Treatment of People With Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT The practice of neurology requires an understanding of clinical ethics for decision‐making. In multiple sclerosis (MS) care, there are a wide range of ethical considerations that may arise. These involve shared decision‐making around selection of a disease‐modifying therapy (DMT), risks and benefits of well‐studied medications in comparison to
Methma Udawatta, Farrah J. Mateen
wiley   +1 more source

Two Steps to Obfuscation

open access: yes, 2014
This note addresses the historical antecedents of the 1998 PageRank measure of centrality.
Friedkin, Noah E., Johnsen, Eugene C.
core   +1 more source

Code trolley: hardware-assisted control flow obfuscation [PDF]

open access: yes, 2020
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core  

Ketogenic Diet as an Epigenetic Therapy in SETD1B‐Related Epilepsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Histone lysine methyltransferases such as SETD1B regulate chromatin structure and gene transcription. Ketone bodies, including butyrate, act as histone deacetylase inhibitors. We report a 4‐year‐old boy with SETD1B‐related absence epilepsy, refractory to conventional medications, who achieved sustained > 90% seizure reduction on the Modified ...
Erica Tsang   +10 more
wiley   +1 more source

Tuning the Electronic Structure and Spin State of Fe─N─C Catalysts Using an Axial Oxygen Ligand and Fe Clusters for High‐Efficiency Rechargeable Zinc–Air Batteries

open access: yesAdvanced Functional Materials, EarlyView.
A FeN4─O/Clu@NC‐0.1Ac catalyst containing atomically‐dispersed FeN4─O sites (medium‐spin Fe2+) and Fe clusters delivered a half‐wave potential of 0.89 V for ORR and an overpotential of 330 mV at 10 mA cm−2 for OER in 0.1 m KOH. When the catalyst was used in a rechargeable Zn–air battery, a power density of 284.5 mW cm−2 was achieved with excellent ...
Yongfang Zhou   +8 more
wiley   +1 more source

Mapping Nanoscale Buckling in Atomically Thin Cr2Ge2Te6

open access: yesAdvanced Functional Materials, EarlyView.
Atomic‐resolution STEM is used to resolve nanoscale buckling in monolayer Cr2Ge2Te₆. A noise‐robust image analysis reconstructs three‐dimensional lattice distortions from single plan‐view images, revealing pronounced defect‐driven nm‐scale out‐of‐plane buckling.
Amy Carl   +20 more
wiley   +1 more source

Translingual Obfuscation [PDF]

open access: yes2016 IEEE European Symposium on Security and Privacy (EuroS&P), 2016
Program obfuscation is an important software protection technique that prevents attackers from revealing the programming logic and design of the software. We introduce translingual obfuscation, a new software obfuscation scheme which makes programs obscure by "misusing" the unique features of certain programming languages.
Wang, Pei   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy