Results 21 to 30 of about 1,996,535 (294)

Model Parameters of Electric Motors for Desired Operating Conditions

open access: yesAdvances in Electrical and Computer Engineering, 2019
Researchers dealing with electric motor control simulations need motor parameters for some desired operating conditions. Despite such an obvious need, no algorithm yielding motor parameters can be found even for the basic set of desired "voltage ...
SEVINC, A.
doaj   +1 more source

Resilient Self-Debugging Software Protection [PDF]

open access: yes2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020
Debuggers are a popular reverse engineering and tampering tool. Self-debugging is an effective technique for applications to defend themselves against hostile debuggers. In penetration tests on state-of-the-art self-debugging, we observed several opportunities through which it could be attacked, however.
Abrath, Bert   +3 more
openaire   +3 more sources

Some Fundamental Cybersecurity Concepts

open access: yesIEEE Access, 2014
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj   +1 more source

ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation

open access: yesCryptography, 2018
This paper presents a method for a decentralised peer-to-peer software license validation system using cryptocurrency blockchain technology to ameliorate software piracy, and to provide a mechanism for software developers to protect copyrighted works ...
Alan Litchfield, Jeff Herbert
doaj   +1 more source

Assessing the reliability of diverse fault-tolerant software-based systems [PDF]

open access: yes, 2002
We discuss a problem in the safety assessment of automatic control and protection systems. There is an increasing dependence on software for performing safety-critical functions, like the safety shut-down of dangerous plants.
Littlewood, B.   +2 more
core   +1 more source

Education Mobility as a Service: A Study of the Features of a Novel Mobility Platform

open access: yesApplied Sciences, 2023
The European Union’s Erasmus+ program strongly supports mobility for finding training or work opportunities. However, in the era of pandemics, there is a need to find remedies for restricted movement.
Małgorzata Gawlik-Kobylińska   +3 more
doaj   +1 more source

Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments

open access: yesAdvances in Electrical and Computer Engineering, 2019
In spite of recent remarkable advances in binary code analysis, adversaries are still using diverse anti-reversing techniques for obfuscating code and making analysis difficult.
PARK, J.   +3 more
doaj   +1 more source

MODEL OF THE FLAT FAIRING ANTENNA DIELECTRIC LAYER WITH AERODYNAMIC HEATING

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2023
To protect the antenna systems of modern aircraft, radio-transparent dielectric fairings are widely used. At low flight speeds, when designing and evaluating the characteristics of the fairing-antenna, it is assumed that the dielectric constant is a ...
Valerii Kozlovskiy   +4 more
doaj   +1 more source

Software-Based Protection against Changeware [PDF]

open access: yesProceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
We call changeware software that surreptitiously modifies resources of software applications, e.g., configuration files. Changeware is developed by malicious entities which gain profit if their changeware is executed by large numbers of end-users of the targeted software.
Sebastian Banescu   +5 more
openaire   +2 more sources

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy