Results 41 to 50 of about 49,336 (256)
Research on the Construction of Malware Variant Datasets and Their Detection Method
Malware detection is of great significance for maintaining the security of information systems. Malware obfuscation techniques and malware variants are increasingly emerging, but their samples and API (application programming interface) sequences are ...
Faming Lu +4 more
doaj +1 more source
Research on deception defense techniques based on network characteristics obfuscation
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense ...
Jinlong ZHAO +2 more
doaj +3 more sources
Protecting Private Attributes in App Based Mobile User Profiling
The Analytics companies enable successful targeted advertising via user profiles, derived from the mobile apps installed by specific users, and hence have become an integral part of the mobile advertising industry. This threatens the users' privacy, when
Imdad Ullah +5 more
doaj +1 more source
Code trolley: hardware-assisted control flow obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core
Association of Corticospinal Tract Asymmetry With Ambulatory Ability After Intracerebral Hemorrhage
ABSTRACT Background Ambulatory ability after intracerebral hemorrhage (ICH) is important to patients. We tested whether asymmetry between ipsi‐ and contra‐lesional corticospinal tracts (CSTs) assessed by diffusion tensor imaging (DTI) is associated with post‐ICH ambulation.
Yasmin N. Aziz +25 more
wiley +1 more source
This note addresses the historical antecedents of the 1998 PageRank measure of centrality.
Friedkin, Noah E., Johnsen, Eugene C.
core +1 more source
Applying an Ethical Lens to the Treatment of People With Multiple Sclerosis
ABSTRACT The practice of neurology requires an understanding of clinical ethics for decision‐making. In multiple sclerosis (MS) care, there are a wide range of ethical considerations that may arise. These involve shared decision‐making around selection of a disease‐modifying therapy (DMT), risks and benefits of well‐studied medications in comparison to
Methma Udawatta, Farrah J. Mateen
wiley +1 more source
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli +8 more
wiley +1 more source
Microplastics from Wearable Bioelectronic Devices: Sources, Risks, and Sustainable Solutions
Bioelectronic devices (e.g., e‐skins) heavily rely on polymers that at the end of their life cycle will generate microplastics. For research, a holistic approach to viewing the full impact of such devices cannot be overlooked. The potential for devices as sources for microplastics is raised, with mitigation strategies surrounding polysaccharide and ...
Conor S. Boland
wiley +1 more source
Translingual Obfuscation [PDF]
Program obfuscation is an important software protection technique that prevents attackers from revealing the programming logic and design of the software. We introduce translingual obfuscation, a new software obfuscation scheme which makes programs obscure by "misusing" the unique features of certain programming languages.
Wang, Pei +4 more
openaire +2 more sources

