Results 21 to 30 of about 1,996,535 (294)
Model Parameters of Electric Motors for Desired Operating Conditions
Researchers dealing with electric motor control simulations need motor parameters for some desired operating conditions. Despite such an obvious need, no algorithm yielding motor parameters can be found even for the basic set of desired "voltage ...
SEVINC, A.
doaj +1 more source
Resilient Self-Debugging Software Protection [PDF]
Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective technique for applications to defend themselves against hostile debuggers. In penetration tests on state-of-the-art self-debugging, we observed several opportunities through which it could be attacked, however.
Abrath, Bert +3 more
openaire +3 more sources
Some Fundamental Cybersecurity Concepts
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj +1 more source
This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works ...
Alan Litchfield, Jeff Herbert
doaj +1 more source
Assessing the reliability of diverse fault-tolerant software-based systems [PDF]
We discuss a problem in the safety assessment of automatic control and protection systems. There is an increasing dependence on software for performing safety-critical functions, like the safety shut-down of dangerous plants.
Littlewood, B. +2 more
core +1 more source
Education Mobility as a Service: A Study of the Features of a Novel Mobility Platform
The European Union’s Erasmus+ program strongly supports mobility for finding training or work opportunities. However, in the era of pandemics, there is a need to find remedies for restricted movement.
Małgorzata Gawlik-Kobylińska +3 more
doaj +1 more source
Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments
In spite of recent remarkable advances in binary code analysis, adversaries are still using diverse anti-reversing techniques for obfuscating code and making analysis difficult.
PARK, J. +3 more
doaj +1 more source
MODEL OF THE FLAT FAIRING ANTENNA DIELECTRIC LAYER WITH AERODYNAMIC HEATING
To protect the antenna systems of modern aircraft, radio-transparent dielectric fairings are widely used. At low flight speeds, when designing and evaluating the characteristics of the fairing-antenna, it is assumed that the dielectric constant is a ...
Valerii Kozlovskiy +4 more
doaj +1 more source
Software-Based Protection against Changeware [PDF]
We call changeware software that surreptitiously modifies resources of software applications, e.g., configuration files. Changeware is developed by malicious entities which gain profit if their changeware is executed by large numbers of end-users of the targeted software.
Sebastian Banescu +5 more
openaire +2 more sources
Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes +3 more
wiley +1 more source

