Results 11 to 20 of about 1,996,535 (294)

OVERLOAD AND TRAFFIC MANAGEMENT OF MESSAGE SOURCES WITH DIFFERENT PRIORITY OF SERVICE

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2023
The scheme of dynamic management of traffic and activity of message sources with different priority of service is considered. The scheme is built on the basis of the neuroprognostic analysis model and the gradient descent method.
Valerii Kozlovskyi   +4 more
doaj   +1 more source

Protecting Your Software Updates [PDF]

open access: yesIEEE Security & Privacy, 2013
As described in many blog posts and the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches, which often involves the manual or automated identification of vulnerable code. The authors evaluate how this identification can be automated with the most frequently referenced diffing tools, demonstrating ...
Coppens B.   +2 more
openaire   +2 more sources

Routing Protection Scheme with High Failure Protection Ratio Based on Software-defined Network [PDF]

open access: yesJisuanji kexue, 2023
SDN has attracted extensive attention from academia for its advantages of strong programmability and centralized control.Existing SDN devices still use the shortest path protocol when performing packet forwarding.When a node in the shortest path fails ...
GENG Haijun, WANG Wei, ZHANG Han, WANG Ling
doaj   +1 more source

Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj   +1 more source

VCF: Virtual Code Folding to Enhance Virtualization Obfuscation

open access: yesIEEE Access, 2020
Code virtualization, also called virtualization obfuscation, is a code obfuscation technique that protects software from malicious analysis. Unlike code packing or code encryption techniques, code virtualization does not restore the original code on the ...
Jae Hyuk Suk, Dong Hoon Lee
doaj   +1 more source

Software implementation of protection against unauthorized access

open access: yesБезопасность информационных технологий, 2023
Information security tools are an integral part of system users. The concept of information security implies the development and expansion of the scope of innovative technologies in information processing.
Albina S. Ismagilova   +1 more
doaj   +1 more source

Chemical Engineering Software and Legal Protection Thereof [PDF]

open access: yesJournal of Petroleum Science and Technology, 2011
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the                market.
Maryam Tavakol moghadam, Kamran Bagheri
doaj   +1 more source

An Object-Based Approach to Modelling and Analysis of Failure Properties [PDF]

open access: yes, 1997
In protection systems, when traditional technology is replaced by software, the functionality and complexity of the system is likely to increase. The quantitative evidence normally provided for safety certification of traditional systems cannot be relied
Cepin, M.   +4 more
core   +2 more sources

Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation

open access: yesIEEE Access, 2016
Digital signature schemes are widely used to protect information integrity in computer communications. However, conventional digital signature schemes are secure only in normal attack contexts. Technically, these schemes assume that the signing algorithm
Yang Shi   +4 more
doaj   +1 more source

Protected Software Module Architectures [PDF]

open access: yes, 2013
A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments.
Strackx, Raoul   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy