Results 61 to 70 of about 21,953 (219)
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley +1 more source
DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks
In recent years numerous advanced malware, aka advanced persistent threats (APT) are allegedly developed by nation-states. The task of attributing an APT to a specific nation-state is extremely challenging for several reasons.
E Stamatatos +6 more
core +1 more source
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi +2 more
wiley +1 more source
Toward Efficient Deobfuscation via Large Language Models
Obfuscation modifies code structure to impede reverse engineering and is widely used to protect intellectual property and evade malware detection. However, existing deobfuscation techniques largely rely on analyst-driven heuristics or are tailored to ...
Byunggeon Choi +3 more
doaj +1 more source
The Geography of Success: A Spatial Analysis of Export Intensity in the Italian Wine Industry
ABSTRACT This paper investigates the paradox of how Italy's fragmented, SME‐dominated wine industry achieves global export success. Moving beyond purely firm‐centric explanations, we test whether export intensity is spatially dependent, clustering geographically in regional ecosystems.
Nicolas Depetris Chauvin, Jonas Di Vita
wiley +1 more source
Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core
Towards code obfuscation through video game crowd sourcing
Code obfuscation is used to prevent software piracy as well as to avoid reverse engineering of malicious software (malware). From the perspective of malware authors, unique approaches to obfuscate code are beneficial to avoid detection. There have been instances where malware authors have leveraged the support of unsuspecting humans for malicious ...
openaire +2 more sources
Variational Autoencoder+Deep Deterministic Policy Gradient addresses low‐light failures of infrared depth sensing for indoor robot navigation. Stage 1 pretrains an attention‐enhanced Variational Autoencoder (Convolutional Block Attention Module+Feature Pyramid Network) to map dark depth frames to a well‐lit reconstruction, yielding a 128‐D latent code ...
Uiseok Lee +7 more
wiley +1 more source
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier +3 more
doaj +1 more source
Abstract Premise Genebanks must maintain viable seeds for decades. Seeds that germinate are clearly alive, but some seeds, often from wild populations, do not germinate because they are dormant, empty, aged, or damaged (D.E.A.D.). This work evaluates the effects of D.E.A.D.
Christina Walters +33 more
wiley +1 more source

