Results 11 to 20 of about 1,996,535 (294)
OVERLOAD AND TRAFFIC MANAGEMENT OF MESSAGE SOURCES WITH DIFFERENT PRIORITY OF SERVICE
The scheme of dynamic management of traffic and activity of message sources with different priority of service is considered. The scheme is built on the basis of the neuroprognostic analysis model and the gradient descent method.
Valerii Kozlovskyi +4 more
doaj +1 more source
Protecting Your Software Updates [PDF]
As described in many blog posts and the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches, which often involves the manual or automated identification of vulnerable code. The authors evaluate how this identification can be automated with the most frequently referenced diffing tools, demonstrating ...
Coppens B. +2 more
openaire +2 more sources
Routing Protection Scheme with High Failure Protection Ratio Based on Software-defined Network [PDF]
SDN has attracted extensive attention from academia for its advantages of strong programmability and centralized control.Existing SDN devices still use the shortest path protocol when performing packet forwarding.When a node in the shortest path fails ...
GENG Haijun, WANG Wei, ZHANG Han, WANG Ling
doaj +1 more source
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj +1 more source
VCF: Virtual Code Folding to Enhance Virtualization Obfuscation
Code virtualization, also called virtualization obfuscation, is a code obfuscation technique that protects software from malicious analysis. Unlike code packing or code encryption techniques, code virtualization does not restore the original code on the ...
Jae Hyuk Suk, Dong Hoon Lee
doaj +1 more source
Software implementation of protection against unauthorized access
Information security tools are an integral part of system users. The concept of information security implies the development and expansion of the scope of innovative technologies in information processing.
Albina S. Ismagilova +1 more
doaj +1 more source
Chemical Engineering Software and Legal Protection Thereof [PDF]
In recent years, an increasing number of Chemical Engineering Software (CES), which play an important role in improving efficiency in the petroleum industry, has been introduced to the market.
Maryam Tavakol moghadam, Kamran Bagheri
doaj +1 more source
An Object-Based Approach to Modelling and Analysis of Failure Properties [PDF]
In protection systems, when traditional technology is replaced by software, the functionality and complexity of the system is likely to increase. The quantitative evidence normally provided for safety certification of traditional systems cannot be relied
Cepin, M. +4 more
core +2 more sources
Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation
Digital signature schemes are widely used to protect information integrity in computer communications. However, conventional digital signature schemes are secure only in normal attack contexts. Technically, these schemes assume that the signing algorithm
Yang Shi +4 more
doaj +1 more source
Protected Software Module Architectures [PDF]
A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure and our personal environments.
Strackx, Raoul +4 more
openaire +2 more sources

