Results 91 to 100 of about 30,050 (262)

Implementation of Obfuscation Technique on PHP Source Code

open access: yesProceeding of the Electrical Engineering Computer Science and Informatics, 2018
Source code on web based applications can be altered easily. This occurred because the source code is not compiled into an executable file. Hence, it can be read and copied easily, or be changed without permission from the author. Obfuscation is a technique that commonly used to secure the source code in any websites based application. Obfuscation is a
Maskur Maskur   +2 more
openaire   +2 more sources

Participatory Policy Development: Reflections on Designing the Strong Roots for Our Futures Program in Victoria

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT In this paper, we trace the journey to create the Strong Roots for our Futures Program, a government program to resource and support Traditional Owners to undertake a range of activities in areas where no state recognition existed. We provide a background to state recognition in Victoria before considering the program design, leading to an ...
Nell Reidy   +2 more
wiley   +1 more source

An Overview of FPGA-inspired Obfuscation Techniques

open access: yesACM Computing Surveys
Building and maintaining a silicon foundry is a costly endeavor that requires substantial financial investment. From this scenario, the semiconductor business has largely shifted to a fabless model where the Integrated Circuit (IC) supply chain is globalized but potentially untrusted.
Zain Ul Abideen   +3 more
openaire   +2 more sources

Expanded application to plant reproductive tissues of a branched DNA probe‐based in situ hybridization method

open access: yesApplications in Plant Sciences, EarlyView.
Abstract Premise Detecting clear tissue‐ and organ‐specific patterns of gene expression is key to understanding the genetic mechanisms that control plant development. In situ hybridization (ISH) of mRNA is one of the most precise, yet most challenging approaches to gene expression assays.
Brooklyn M. Anaya   +3 more
wiley   +1 more source

Android App Birthmarking Technique Resilient to Code Obfuscation

open access: yesThe Journal of Korean Institute of Communications and Information Sciences, 2015
A software birthmark is the set of characteristics of a program which can be used to identify the program. Many researchers have studied on detecting theft of java programs using some birthmarks. In case of Android apps, code obfuscation techniques are used to protect the apps against reverse-engineering and tampering.
Dongjin Kim   +5 more
openaire   +2 more sources

Assessing the viability of genebanked seeds from rare, wild plants native to the United States using the D.E.A.D. paradigm

open access: yesApplications in Plant Sciences, EarlyView.
Abstract Premise Genebanks must maintain viable seeds for decades. Seeds that germinate are clearly alive, but some seeds, often from wild populations, do not germinate because they are dormant, empty, aged, or damaged (D.E.A.D.). This work evaluates the effects of D.E.A.D.
Christina Walters   +33 more
wiley   +1 more source

Early synapsids neurosensory diversity revealed by CT and synchrotron scanning

open access: yesThe Anatomical Record, EarlyView.
Abstract Non‐mammaliaform synapsids (NMS) represent the closest relatives of today's mammals among the early amniotes. Exploring their brain and nervous system is key to understanding how mammals evolved. Here, using CT and Synchrotron scanning, we document for the first time three extreme cases of neurosensory and behavioral adaptations that probe ...
J. Benoit   +6 more
wiley   +1 more source

Ontogeny of the malleus in Mesocricetus auratus (Mammalia, Rodentia): Systematic and functional implications for the muroid middle ear

open access: yesThe Anatomical Record, EarlyView.
Abstract The three mammalian auditory ossicles enhance sound transmission from the tympanic membrane to the inner ear. The anterior anchoring of the malleus is one of the key characters for functional classification of the auditory ossicles. Previous studies revealed a medial outgrowth of the mallear anterior process, the processus internus ...
Franziska Fritzsche   +2 more
wiley   +1 more source

MalFormer: A Novel Vision Transformer Model for Robust Malware Analysis

open access: yesIEEE Access
As traditional signature-based malware analysis struggles to detect malware variants, image-based malware analysis has been researched to overcome these limitations.
In-Woong Jeong   +3 more
doaj   +1 more source

A Survey on Program Code Obfuscation Technique

open access: yesEngineering and Technology Journal, 2016
Program code are distributed through internet and suffering from the program theft. Means a program is sold to user and user make own copyright of program called program theft. This is happen because program are easily decomposed into reusable class file and also decomposed into source code by the program users.
openaire   +1 more source

Home - About - Disclaimer - Privacy