Results 41 to 50 of about 30,050 (262)

Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism

open access: yesScientific Reports, 2023
With the rise in popularity and usage of Android operating systems, malicious applications are targeted by applying innovative ways and techniques.
Sana Aurangzeb, Muhammad Aleem
doaj   +1 more source

On the Effectiveness of Perturbations in Generating Evasive Malware Variants

open access: yesIEEE Access, 2023
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin   +3 more
doaj   +1 more source

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

Positive Results and Techniques for Obfuscation [PDF]

open access: yes, 2004
Informally, an obfuscator \({\mathcal{O}}\) is an efficient, probabilistic “compiler” that transforms a program P into a new program (P) with the same functionality as P, but such that \({\mathcal{O}}(P)\) protects any secrets that may be built into and used by P.
Benjamin Lynn   +2 more
openaire   +1 more source

Microplastics from Wearable Bioelectronic Devices: Sources, Risks, and Sustainable Solutions

open access: yesAdvanced Functional Materials, EarlyView.
Bioelectronic devices (e.g., e‐skins) heavily rely on polymers that at the end of their life cycle will generate microplastics. For research, a holistic approach to viewing the full impact of such devices cannot be overlooked. The potential for devices as sources for microplastics is raised, with mitigation strategies surrounding polysaccharide and ...
Conor S. Boland
wiley   +1 more source

Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis

open access: yesComputers
The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats.
Khaled Saleh   +4 more
doaj   +1 more source

PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers

open access: yesIEEE Access, 2023
In recent years, PowerShell has become the common tool that helps attackers launch targeted attacks using living-off-the-land tactics and fileless attack techniques.
Meng-Han Tsai   +4 more
doaj   +1 more source

Privacy Tradeoffs in Predictive Analytics [PDF]

open access: yes, 2014
Online services routinely mine user data to predict user preferences, make recommendations, and place targeted ads. Recent research has demonstrated that several private user attributes (such as political affiliation, sexual orientation, and gender) can ...
Bhagat, Smriti   +5 more
core   +3 more sources

Gram‐Scale Production of Iron Oxide Rubik‐Cube Nanoparticles: New Tools for the Clinical Translation of Magnetic Hyperthermia and Magnetic Particle Imaging

open access: yesAdvanced Functional Materials, EarlyView.
This work reports the first gram‐scale solvothermal synthesis of ‘Rubik's cube’ nanoparticles—cubic, dendritic multicore structures with tuneable sizes and exceptional magnetic heating performance. Featuring iron oxide single‐domain character, with low coercivity fields, high magnetization, and strong MPI signals, they enable viscosity‐independent ...
Giusy M. R. Rizzo   +12 more
wiley   +1 more source

Evaluating Adversarial Robustness of Secret Key-Based Defenses

open access: yesIEEE Access, 2022
The vulnerability of neural networks to adversarial attacks has inspired the proposal of many defenses. Key-based input transformation techniques are the recently proposed methods that make use of gradient obfuscation to improve the adversarial ...
Ziad Tariq Muhammad Ali   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy