Epidemiological trends and indications of shoulder arthroscopy among 191,549 patients in the United States. [PDF]
Burkhart RJ +9 more
europepmc +1 more source
Metadata driven malicious URL detection using RoBERTa large and multi source network threat intelligence. [PDF]
Chen L, Meng L.
europepmc +1 more source
Real time identification of phishing attacks through machine learning enhanced browser extensions. [PDF]
Dandotiya M +3 more
europepmc +1 more source
Epstein‐Barr virus as a driver of lupus: Rethinking triggers in autoimmunity
Rheumatology &Autoimmunity, EarlyView.
Jiekai Tan, Fanlei Hu, Chuanhui Xu
wiley +1 more source
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments. [PDF]
Ferdous J +3 more
europepmc +1 more source
Improving malware detection performance using hybrid deep representation learning with heuristic search algorithms. [PDF]
Anuradha A, Chouhan AS, Srinivas Rao S.
europepmc +1 more source
AndroDex: Android Dex Images of Obfuscated Malware. [PDF]
Aurangzeb S +4 more
europepmc +1 more source
Related searches:
Code obfuscation techniques for metamorphic viruses
Journal in Computer Virology, 2008This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques with respect to metamorphic viruses. Our objective is to evaluate the difficulty of a reliable static detection of viruses that use such obfuscation techniques. Here we extend Spinellis’ result (IEEE Trans. Inform.
Ludovic Mé
exaly +3 more sources
Advanced obfuscation techniques for Java bytecode
Journal of Systems and Software, 2004There exist several obfuscation tools for preventing Java bytecode from being decompiled. Most of these tools, simply scramble the names of the identifiers stored in a bytecode by substituting the identifiers with meaningless names. However, the scrambling technique cannot deter a determined cracker very long.
Jien-Tsai Chan, Wuu Yang
exaly +2 more sources

