Results 41 to 50 of about 49,594 (257)
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core +1 more source
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco +2 more
core +2 more sources
Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient
Quantum obfuscation is one of the important primitives in quantum cryptography that can be used to enhance the security of various quantum cryptographic schemes.
Yazhuo Jiang +3 more
doaj +1 more source
Applying an Ethical Lens to the Treatment of People With Multiple Sclerosis
ABSTRACT The practice of neurology requires an understanding of clinical ethics for decision‐making. In multiple sclerosis (MS) care, there are a wide range of ethical considerations that may arise. These involve shared decision‐making around selection of a disease‐modifying therapy (DMT), risks and benefits of well‐studied medications in comparison to
Methma Udawatta, Farrah J. Mateen
wiley +1 more source
This note addresses the historical antecedents of the 1998 PageRank measure of centrality.
Friedkin, Noah E., Johnsen, Eugene C.
core +1 more source
Code trolley: hardware-assisted control flow obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core
Ketogenic Diet as an Epigenetic Therapy in SETD1B‐Related Epilepsy
ABSTRACT Histone lysine methyltransferases such as SETD1B regulate chromatin structure and gene transcription. Ketone bodies, including butyrate, act as histone deacetylase inhibitors. We report a 4‐year‐old boy with SETD1B‐related absence epilepsy, refractory to conventional medications, who achieved sustained > 90% seizure reduction on the Modified ...
Erica Tsang +10 more
wiley +1 more source
A FeN4─O/Clu@NC‐0.1Ac catalyst containing atomically‐dispersed FeN4─O sites (medium‐spin Fe2+) and Fe clusters delivered a half‐wave potential of 0.89 V for ORR and an overpotential of 330 mV at 10 mA cm−2 for OER in 0.1 m KOH. When the catalyst was used in a rechargeable Zn–air battery, a power density of 284.5 mW cm−2 was achieved with excellent ...
Yongfang Zhou +8 more
wiley +1 more source
Mapping Nanoscale Buckling in Atomically Thin Cr2Ge2Te6
Atomic‐resolution STEM is used to resolve nanoscale buckling in monolayer Cr2Ge2Te₆. A noise‐robust image analysis reconstructs three‐dimensional lattice distortions from single plan‐view images, revealing pronounced defect‐driven nm‐scale out‐of‐plane buckling.
Amy Carl +20 more
wiley +1 more source
Translingual Obfuscation [PDF]
Program obfuscation is an important software protection technique that prevents attackers from revealing the programming logic and design of the software. We introduce translingual obfuscation, a new software obfuscation scheme which makes programs obscure by "misusing" the unique features of certain programming languages.
Wang, Pei +4 more
openaire +2 more sources

