Results 31 to 40 of about 30,154 (232)

Conceptualising quality early childhood education: Learning from young children in Brazil and South Africa through creative and play‐based methods

open access: yesBritish Educational Research Journal, EarlyView., 2023
Abstract Early childhood has increasingly been acknowledged as a vital time for all children. Inclusive and quality education is part of the United Nations Sustainable Development Goals, with the further specification that all children have access to quality pre‐primary education.
Laura H. V. Wright   +8 more
wiley   +1 more source

A Framework to Quantify the Quality of Source Code Obfuscation

open access: yesApplied Sciences
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin   +4 more
doaj   +1 more source

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]

open access: yes, 2018
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco   +2 more
core   +2 more sources

Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism

open access: yesScientific Reports, 2023
With the rise in popularity and usage of Android operating systems, malicious applications are targeted by applying innovative ways and techniques.
Sana Aurangzeb, Muhammad Aleem
doaj   +1 more source

On the Effectiveness of Perturbations in Generating Evasive Malware Variants

open access: yesIEEE Access, 2023
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin   +3 more
doaj   +1 more source

Trust and obfuscation principles for quality of information in emerging pervasive environments [PDF]

open access: yes, 2012
Non peer ...
Bisdikian, Chatschik   +3 more
core   +1 more source

Privacy Tradeoffs in Predictive Analytics [PDF]

open access: yes, 2014
Online services routinely mine user data to predict user preferences, make recommendations, and place targeted ads. Recent research has demonstrated that several private user attributes (such as political affiliation, sexual orientation, and gender) can ...
Bhagat, Smriti   +5 more
core   +3 more sources

Bio‐Inspired Molecular Events in Poly(Ionic Liquids)

open access: yesAdvanced Functional Materials, EarlyView.
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley   +1 more source

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers

open access: yesIEEE Access, 2023
In recent years, PowerShell has become the common tool that helps attackers launch targeted attacks using living-off-the-land tactics and fileless attack techniques.
Meng-Han Tsai   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy