Results 11 to 20 of about 1,981,488 (283)
Routing Protection Scheme with High Failure Protection Ratio Based on Software-defined Network [PDF]
SDN has attracted extensive attention from academia for its advantages of strong programmability and centralized control.Existing SDN devices still use the shortest path protocol when performing packet forwarding.When a node in the shortest path fails ...
GENG Haijun, WANG Wei, ZHANG Han, WANG Ling
doaj +1 more source
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj +1 more source
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
Code virtualization, also called virtualization obfuscation, is a code obfuscation technique that protects software from malicious analysis. Unlike code packing or code encryption techniques, code virtualization does not restore the original code on the ...
Jae Hyuk Suk, Dong Hoon Lee
doaj +1 more source
Software implementation of protection against unauthorized access
Information security tools are an integral part of system users. The concept of information security implies the development and expansion of the scope of innovative technologies in information processing.
Albina S. Ismagilova +1 more
doaj +1 more source
Chemical Engineering Software and Legal Protection Thereof [PDF]
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the market.
Maryam Tavakol moghadam, Kamran Bagheri
doaj +1 more source
SOFIA : software and control flow integrity architecture [PDF]
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart +8 more
core +1 more source
Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation
Digital signature schemes are widely used to protect information integrity in computer communications. However, conventional digital signature schemes are secure only in normal attack contexts. Technically, these schemes assume that the signing algorithm
Yang Shi +4 more
doaj +1 more source
Protected Software Module Architectures [PDF]
A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments.
Strackx, Raoul +4 more
openaire +2 more sources
Model Parameters of Electric Motors for Desired Operating Conditions
Researchers dealing with electric motor control simulations need motor parameters for some desired operating conditions. Despite such an obvious need, no algorithm yielding motor parameters can be found even for the basic set of desired "voltage ...
SEVINC, A.
doaj +1 more source
Severity-sensitive norm-governed multi-agent planning [PDF]
This research was funded by Selex ES. The software developed during this research, including the norm analysis and planning algorithms, the simulator and harbour protection scenario used during evaluation is freely available from doi:10.5258/SOTON ...
Gasparini, Luca +2 more
core +1 more source

