Results 91 to 100 of about 19,819 (285)

The Technique of Binary Code Decompilation and Its Application in Information Security Sphere

open access: yesБезопасность информационных технологий, 2012
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
M. O. Shudrak   +2 more
doaj  

A Tutorial on Software Obfuscation [PDF]

open access: yes, 2016
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person to an entire organization. The trust boundary of an entity is represented by all the (virtual or physical) machines controlled by that entity.
openaire  

A Crystallographic Shear Driven by Oxygen Insertion in (LuFeO3)nLuFe2O4

open access: yesChemistryEurope, EarlyView.
Layered structures (LuFeO3)nLuFe2O4 exhibit a common structural transformation upon oxygen uptake. Although the LuFeO3 units do not directly participate in oxygen insertion, these inactive layers nevertheless influence the temperature at which oxygen absorption occurs.
Tianyu Li   +7 more
wiley   +1 more source

Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud

open access: yesIEEE Access, 2019
The contributions of cloud computing in the prevention of software piracy are inadequate, and there are still rampant piratical mobile service applications in the cloud.
Sun Guang   +4 more
doaj   +1 more source

Environmental Dynamism and Supply Chain Responsiveness Nexus: Do Organisational Improvisation and Supply Chain Orientation Matter?

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The crucial role of environmental dynamism (ED) in achieving supply chain responsiveness (SCR) has become a controversial topic in extant literature. However, despite several empirical studies on environmental dynamism and supply chain responsiveness, inconsistent findings and underexplored areas leave supply chain managers less informed about
Alexander Otchere Fianko   +3 more
wiley   +1 more source

The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi   +3 more
wiley   +1 more source

Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts

open access: yes, 2017
Most of the JavaScript code deployed in the wild has been minified, a process in which identifier names are replaced with short, arbitrary and meaningless names.
Bavishi, Rohan   +2 more
core  

Exploring Sustainability Reporting Practices in an Emerging Market: Insights From Corporate Governance and Disclosure Tone

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The study examines how narrative disclosure tones (NDTs) and corporate governance mechanisms (CGMs) affect sustainability reporting practices (SRP) in an emerging economy. Data from 125 non‐financial firms in Pakistan, spanning 2011–2022, are utilized. SRP is measured using both GRI and the novel IFRS S1 standards‐based indices. Three NDTs are
Arshad Hasan   +2 more
wiley   +1 more source

Software deobfuscation methods: analysis and implementation

open access: yesТруды Института системного программирования РАН, 2018
This paper describes the work on development of the deobfuscation software. The main target of the developed software is the analysis of the obfuscated malware code.
Sh. F. Kurmangaleev   +5 more
doaj  

Analysis of Software Countermeasures for Whitebox Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model where the adversary has full access to the execution environment.
Subhadeep Banik   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy