Results 41 to 50 of about 49,336 (256)

Research on the Construction of Malware Variant Datasets and Their Detection Method

open access: yesApplied Sciences, 2022
Malware detection is of great significance for maintaining the security of information systems. Malware obfuscation techniques and malware variants are increasingly emerging, but their samples and API (application programming interface) sequences are ...
Faming Lu   +4 more
doaj   +1 more source

Research on deception defense techniques based on network characteristics obfuscation

open access: yes网络与信息安全学报, 2021
There is usually a reconnaissance stage before a network attack, the attacker obtains the key information of the target system through techniques such as traffic analysis and active scanning, to formulate a targeted network attack.Deception defense ...
Jinlong ZHAO   +2 more
doaj   +3 more sources

Protecting Private Attributes in App Based Mobile User Profiling

open access: yesIEEE Access, 2020
The Analytics companies enable successful targeted advertising via user profiles, derived from the mobile apps installed by specific users, and hence have become an integral part of the mobile advertising industry. This threatens the users' privacy, when
Imdad Ullah   +5 more
doaj   +1 more source

Code trolley: hardware-assisted control flow obfuscation [PDF]

open access: yes, 2020
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core  

Association of Corticospinal Tract Asymmetry With Ambulatory Ability After Intracerebral Hemorrhage

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Ambulatory ability after intracerebral hemorrhage (ICH) is important to patients. We tested whether asymmetry between ipsi‐ and contra‐lesional corticospinal tracts (CSTs) assessed by diffusion tensor imaging (DTI) is associated with post‐ICH ambulation.
Yasmin N. Aziz   +25 more
wiley   +1 more source

Two Steps to Obfuscation

open access: yes, 2014
This note addresses the historical antecedents of the 1998 PageRank measure of centrality.
Friedkin, Noah E., Johnsen, Eugene C.
core   +1 more source

Applying an Ethical Lens to the Treatment of People With Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT The practice of neurology requires an understanding of clinical ethics for decision‐making. In multiple sclerosis (MS) care, there are a wide range of ethical considerations that may arise. These involve shared decision‐making around selection of a disease‐modifying therapy (DMT), risks and benefits of well‐studied medications in comparison to
Methma Udawatta, Farrah J. Mateen
wiley   +1 more source

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Microplastics from Wearable Bioelectronic Devices: Sources, Risks, and Sustainable Solutions

open access: yesAdvanced Functional Materials, EarlyView.
Bioelectronic devices (e.g., e‐skins) heavily rely on polymers that at the end of their life cycle will generate microplastics. For research, a holistic approach to viewing the full impact of such devices cannot be overlooked. The potential for devices as sources for microplastics is raised, with mitigation strategies surrounding polysaccharide and ...
Conor S. Boland
wiley   +1 more source

Translingual Obfuscation [PDF]

open access: yes2016 IEEE European Symposium on Security and Privacy (EuroS&P), 2016
Program obfuscation is an important software protection technique that prevents attackers from revealing the programming logic and design of the software. We introduce translingual obfuscation, a new software obfuscation scheme which makes programs obscure by "misusing" the unique features of certain programming languages.
Wang, Pei   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy