Results 91 to 100 of about 19,819 (285)
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
M. O. Shudrak +2 more
doaj
A Tutorial on Software Obfuscation [PDF]
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person to an entire organization. The trust boundary of an entity is represented by all the (virtual or physical) machines controlled by that entity.
openaire
A Crystallographic Shear Driven by Oxygen Insertion in (LuFeO3)nLuFe2O4
Layered structures (LuFeO3)nLuFe2O4 exhibit a common structural transformation upon oxygen uptake. Although the LuFeO3 units do not directly participate in oxygen insertion, these inactive layers nevertheless influence the temperature at which oxygen absorption occurs.
Tianyu Li +7 more
wiley +1 more source
Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud
The contributions of cloud computing in the prevention of software piracy are inadequate, and there are still rampant piratical mobile service applications in the cloud.
Sun Guang +4 more
doaj +1 more source
ABSTRACT The crucial role of environmental dynamism (ED) in achieving supply chain responsiveness (SCR) has become a controversial topic in extant literature. However, despite several empirical studies on environmental dynamism and supply chain responsiveness, inconsistent findings and underexplored areas leave supply chain managers less informed about
Alexander Otchere Fianko +3 more
wiley +1 more source
The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi +3 more
wiley +1 more source
Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts
Most of the JavaScript code deployed in the wild has been minified, a process in which identifier names are replaced with short, arbitrary and meaningless names.
Bavishi, Rohan +2 more
core
ABSTRACT The study examines how narrative disclosure tones (NDTs) and corporate governance mechanisms (CGMs) affect sustainability reporting practices (SRP) in an emerging economy. Data from 125 non‐financial firms in Pakistan, spanning 2011–2022, are utilized. SRP is measured using both GRI and the novel IFRS S1 standards‐based indices. Three NDTs are
Arshad Hasan +2 more
wiley +1 more source
Software deobfuscation methods: analysis and implementation
This paper describes the work on development of the deobfuscation software. The main target of the developed software is the analysis of the obfuscated malware code.
Sh. F. Kurmangaleev +5 more
doaj
Analysis of Software Countermeasures for Whitebox Encryption
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model where the adversary has full access to the execution environment.
Subhadeep Banik +3 more
doaj +1 more source

