Results 21 to 30 of about 1,980,136 (283)
Some Fundamental Cybersecurity Concepts
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj +1 more source
Severity-sensitive norm-governed multi-agent planning [PDF]
This research was funded by Selex ES. The software developed during this research, including the norm analysis and planning algorithms, the simulator and harbour protection scenario used during evaluation is freely available from doi:10.5258/SOTON ...
Gasparini, Luca +2 more
core +1 more source
This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works ...
Alan Litchfield, Jeff Herbert
doaj +1 more source
Assessing the reliability of diverse fault-tolerant software-based systems [PDF]
We discuss a problem in the safety assessment of automatic control and protection systems. There is an increasing dependence on software for performing safety-critical functions, like the safety shut-down of dangerous plants.
Littlewood, B. +2 more
core +1 more source
Attack simulation based software protection assessment method [PDF]
Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections.
d'Annoville, Jerome +6 more
core +3 more sources
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect.
Qing Su, Fan He, Naiqi Wu, Zhiyi Lin
doaj +1 more source
Education Mobility as a Service: A Study of the Features of a Novel Mobility Platform
The European Union’s Erasmus+ program strongly supports mobility for finding training or work opportunities. However, in the era of pandemics, there is a need to find remedies for restricted movement.
Małgorzata Gawlik-Kobylińska +3 more
doaj +1 more source
Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments
In spite of recent remarkable advances in binary code analysis, adversaries are still using diverse anti-reversing techniques for obfuscating code and making analysis difficult.
PARK, J. +3 more
doaj +1 more source
MODEL OF THE FLAT FAIRING ANTENNA DIELECTRIC LAYER WITH AERODYNAMIC HEATING
To protect the antenna systems of modern aircraft, radio-transparent dielectric fairings are widely used. At low flight speeds, when designing and evaluating the characteristics of the fairing-antenna, it is assumed that the dielectric constant is a ...
Valerii Kozlovskiy +4 more
doaj +1 more source
Software-Based Protection against Changeware [PDF]
We call changeware software that surreptitiously modifies resources of software applications, e.g., configuration files. Changeware is developed by malicious entities which gain profit if their changeware is executed by large numbers of end-users of the targeted software.
Sebastian Banescu +5 more
openaire +2 more sources

