Results 11 to 20 of about 1,981,488 (283)

Routing Protection Scheme with High Failure Protection Ratio Based on Software-defined Network [PDF]

open access: yesJisuanji kexue, 2023
SDN has attracted extensive attention from academia for its advantages of strong programmability and centralized control.Existing SDN devices still use the shortest path protocol when performing packet forwarding.When a node in the shortest path fails ...
GENG Haijun, WANG Wei, ZHANG Han, WANG Ling
doaj   +1 more source

Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj   +1 more source

VCF: Virtual Code Folding to Enhance Virtualization Obfuscation

open access: yesIEEE Access, 2020
Code virtualization, also called virtualization obfuscation, is a code obfuscation technique that protects software from malicious analysis. Unlike code packing or code encryption techniques, code virtualization does not restore the original code on the ...
Jae Hyuk Suk, Dong Hoon Lee
doaj   +1 more source

Software implementation of protection against unauthorized access

open access: yesБезопасность информационных технологий, 2023
Information security tools are an integral part of system users. The concept of information security implies the development and expansion of the scope of innovative technologies in information processing.
Albina S. Ismagilova   +1 more
doaj   +1 more source

Chemical Engineering Software and Legal Protection Thereof [PDF]

open access: yesJournal of Petroleum Science and Technology, 2011
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the                market.
Maryam Tavakol moghadam, Kamran Bagheri
doaj   +1 more source

SOFIA : software and control flow integrity architecture [PDF]

open access: yes, 2016
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart   +8 more
core   +1 more source

Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation

open access: yesIEEE Access, 2016
Digital signature schemes are widely used to protect information integrity in computer communications. However, conventional digital signature schemes are secure only in normal attack contexts. Technically, these schemes assume that the signing algorithm
Yang Shi   +4 more
doaj   +1 more source

Protected Software Module Architectures [PDF]

open access: yes, 2013
A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments.
Strackx, Raoul   +4 more
openaire   +2 more sources

Model Parameters of Electric Motors for Desired Operating Conditions

open access: yesAdvances in Electrical and Computer Engineering, 2019
Researchers dealing with electric motor control simulations need motor parameters for some desired operating conditions. Despite such an obvious need, no algorithm yielding motor parameters can be found even for the basic set of desired "voltage ...
SEVINC, A.
doaj   +1 more source

Severity-sensitive norm-governed multi-agent planning [PDF]

open access: yes, 2017
This research was funded by Selex ES. The software developed during this research, including the norm analysis and planning algorithms, the simulator and harbour protection scenario used during evaluation is freely available from doi:10.5258/SOTON ...
Gasparini, Luca   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy