Results 31 to 40 of about 30,050 (262)

Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection

open access: yesIEEE Access, 2021
With more than three million applications already in the Android marketplace, various malware detection systems based on machine learning have been proposed to prevent attacks from cybercriminals; most of these systems use static analyses to extract ...
Yun-Chung Chen   +4 more
doaj   +1 more source

A Comprehensive Analysis of Software Obfuscation Techniques

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023
In today's environment, a huge and increasing range of unauthorised practises allows hackers to get unauthorised access to devices and private information by inserting harmful code. The purpose of this research is to assess the efficiency of obfuscation strategies in safeguarding software against reverse engineering and tampering.
null Priyanka Kadam   +2 more
openaire   +1 more source

The current state of art in program obfuscations:definitions of obfuscation security

open access: yesТруды Института системного программирования РАН, 2018
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
N. P. Varnovsky   +3 more
doaj   +1 more source

Detection of Obfuscated Malicious JavaScript Code

open access: yesFuture Internet, 2022
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal ...
Ammar Alazab   +3 more
doaj   +1 more source

Conceptualising quality early childhood education: Learning from young children in Brazil and South Africa through creative and play‐based methods

open access: yesBritish Educational Research Journal, EarlyView., 2023
Abstract Early childhood has increasingly been acknowledged as a vital time for all children. Inclusive and quality education is part of the United Nations Sustainable Development Goals, with the further specification that all children have access to quality pre‐primary education.
Laura H. V. Wright   +8 more
wiley   +1 more source

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]

open access: yes, 2018
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco   +2 more
core   +2 more sources

Enhanced Obfuscation Technique for Data Confidentiality in Public Cloud Storage

open access: yesMATEC Web of Conferences, 2016
With an advent of cloud computing, data storage has become a boon in information technology. At the same time, data storage in remote places have become important issues. Lot of techniques are available to ensure protection of data confidentiality. These
Oli S. Arul, Arockiam L.
doaj   +1 more source

PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]

open access: yes, 2018
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L.   +3 more
core   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

Trust and obfuscation principles for quality of information in emerging pervasive environments [PDF]

open access: yes, 2012
Non peer ...
Bisdikian, Chatschik   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy