Results 71 to 80 of about 21,953 (219)
Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca +1 more
core
CodeCipher: Learning to Obfuscate Source Code Against LLMs
While large code language models have made significant strides in AI-assisted coding tasks, there are growing concerns about privacy challenges. The user code is transparent to the cloud LLM service provider, inducing risks of unauthorized training, reading, and execution of the user code.
Lin, Yalan +3 more
openaire +2 more sources
Moving beyond neurophobia to cultivate the neuroquisitive learner
Abstract “Neurophobia,” a pervasive fear of the neurological sciences, poses a significant barrier in medical education, affecting learners and physicians worldwide. Its consequences are far‐reaching, contributing to a limited neurology workforce and diminished confidence among non‐specialists in managing neurological conditions.
Joanna R. Appel +1 more
wiley +1 more source
This systematic literature review aimed to identify and characterize existing interventions designed to empower citizens to spontaneously report adverse drug reactions (ADRs) and to determine which interventions have been shown to be the most effective internationally. The research question was structured using the PICO framework.
Margarida Perdigão +3 more
wiley +1 more source
Android Authorship Attribution Using Source Code-Based Features
With the widespread use of mobile devices, Android has become the most popular operating system, and new applications being uploaded to the Android market every day.
Emre Aydogan, Sevil Sen
doaj +1 more source
Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays
Array restructuring operations obscure arrays. Our work aims on java source code obfuscation containing arrays. Our main proposal is Classes with restructured array members and obscured member methods for setting, getting array elements and to get the length of arrays.
Sivadasan, Praveen, Lal, P. Sojan
openaire +2 more sources
Learner emotions and performance in hypercasual VR games with adaptive AI difficulty
Abstract Hypercasual virtual reality games (HVRGs) are widely regarded as cost‐effective tools for rapid skill acquisition, yet the mechanisms that optimise their effectiveness and user acceptance remain insufficiently explored. This mixed‐methods empirical study investigates how playful emotions, characterised by engagement, enjoyment and anxiety ...
Zeeshan Ahmed, Faizan Ahmad, Chen Hui
wiley +1 more source
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj
Abstract Mental health problems are common among UK undergraduate students. In response, many universities have put considerable effort into raising awareness about student mental health problems and avenues of support (e.g., via workshops, posters, email newsletters and social media posts).
Sorcha Finan, Lucy Foulkes
wiley +1 more source
Abstract This scoping review has explored the interventions and approaches used by teachers in mainstream (general education) primary schools (students aged 4–11) to support self‐regulation skill development in the classroom. The review followed the PRISMA Extension for Scoping Reviews (PRISMA‐ScR) guidelines for reporting and was guided by the Joanna ...
Kim Griffin +3 more
wiley +1 more source

