Results 161 to 170 of about 19,819 (285)
Mitigating Automated Obfuscation Attacks on Software Plagiarism Detection Systems
Plagiarismus stellt eine signifikante Herausforderung in der Informatikausbildung dar und kann insbesondere in Lehrveranstaltungen zur Programmierung zum Problem werden. Um Plagiate in großen Lehrveranstaltungen identifizieren zu können, sind Lehrende auf automatisierte Erkennungssysteme angewiesen.
openaire +3 more sources
Abstract This article analyses ideas of ‘good governance through technology’ in India that first emerged from the software industry, symbolizing state support for the ‘new middle‐class’ values of liberalized private enterprise. We suggest that the contemporary prominence of consulting firms in government represents a second transformation that embeds ...
Matt Birkinshaw, Sanjay Srivastava
wiley +1 more source
Semantic code clone detection using hybrid intermediate representations and BiLSTM networks. [PDF]
Shahbaz Ismail M, Shahzad S, Quradaa FH.
europepmc +1 more source
Fixed Pay for Output or Time? Implications for Work Speed and Quality
ABSTRACT This paper explores the influence of two fixed payment arrangements—time‐based and output‐based wages—on worker behavior and performance in a multidimensional task setting. We examine how these wages affect the time workers spend on individual units of a task and their work quality.
CAROLYN DELLER, SANTIAGO GALLINO
wiley +1 more source
JDroid: Android malware detection using hybrid opcode feature vector. [PDF]
Arslan RS.
europepmc +1 more source
SOFTWARE MODULE PROTECTION METHOD BASED ON OBFUSCATION PROCEDURE
S.G. Semenov +3 more
openaire +1 more source
Russian wheat aphid: a model for genomic plasticity and a challenge to breeders
Invasive foundress finds suitable habitat and reproduces through pathogenesis. Wingless females produce life offspring quickly, which leads to high population densities. High population densities result in competition, which may induce epigenetic changes and wing development for dispersal.
Astrid Jankielsohn +8 more
wiley +1 more source
Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes. [PDF]
Huang GC, Chang KC, Lai TH.
europepmc +1 more source
Abstract Drug entry into prisons represents a serious issue for both incarcerated people and prison staff. Although substances enter prisons in many ways, staff drug smuggling represents a consistent problem facing correctional institutions globally. We draw on 131 interviews with correctional officers (COs) working in four Western Canadian prisons to ...
William J. Schultz +2 more
wiley +1 more source
Transfer learning with XAI for robust malware and IoT network security. [PDF]
Almadhor A +6 more
europepmc +1 more source

