Results 31 to 40 of about 30,154 (232)
Abstract Early childhood has increasingly been acknowledged as a vital time for all children. Inclusive and quality education is part of the United Nations Sustainable Development Goals, with the further specification that all children have access to quality pre‐primary education.
Laura H. V. Wright +8 more
wiley +1 more source
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers to infringe upon and steal intellectual property. We can employ obfuscation techniques to protect against such attackers as useful tools to safeguard software ...
Hongjoo Jin +4 more
doaj +1 more source
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information [PDF]
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. Yet, surprisingly, metadata are often still catergorized as non-sensitive.
Musolesi, Mirco +2 more
core +2 more sources
With the rise in popularity and usage of Android operating systems, malicious applications are targeted by applying innovative ways and techniques.
Sana Aurangzeb, Muhammad Aleem
doaj +1 more source
On the Effectiveness of Perturbations in Generating Evasive Malware Variants
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin +3 more
doaj +1 more source
Trust and obfuscation principles for quality of information in emerging pervasive environments [PDF]
Non peer ...
Bisdikian, Chatschik +3 more
core +1 more source
Privacy Tradeoffs in Predictive Analytics [PDF]
Online services routinely mine user data to predict user preferences, make recommendations, and place targeted ads. Recent research has demonstrated that several private user attributes (such as political affiliation, sexual orientation, and gender) can ...
Bhagat, Smriti +5 more
core +3 more sources
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh +4 more
doaj +1 more source
PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers
In recent years, PowerShell has become the common tool that helps attackers launch targeted attacks using living-off-the-land tactics and fileless attack techniques.
Meng-Han Tsai +4 more
doaj +1 more source

