Results 71 to 80 of about 22,093 (250)

IMPLEMENTASI TEKNIK OBFUSCATION PADA SOURCE CODE PHP DENGAN ALGORITMA RIVEST CIPHER 4

open access: yessemanTIK, 2020
Aplikasi web merupakan suatu aplikasi dengan konsep client server yang dapat membentuk halaman-halaman website berdasarkan permintaan pengguna. Salah satu teknologi open source yang sangat banyak digunakan untuk membangun website adalah PHP. Sayangnya aplikasi website dengan teknologi open source berbasis PHP harus didistribusikan dalam bentuk source ...
Ramadhan, Artono Dwi   +2 more
openaire   +3 more sources

Social capital and employability development among Chinese Mainland undergraduates in Hong Kong: An exploration of network dynamics, structural constraints and agentic practices

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Bourdieu's sociological concept of social capital highlights its significance in enabling individuals to access other forms of capital for personal advantage. In the literature on university students' employability, particularly that concerning international and non‐local students, social capital is widely recognised as a key asset, alongside ...
Fang Gao, Thanh Pham
wiley   +1 more source

Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques

open access: yesJournal of Computer Science and Technology, 2008
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj  

Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]

open access: yes, 2009
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core  

Loss, persistence and reversal of phenotypic traits

open access: yesBiological Reviews, EarlyView.
ABSTRACT The irreversibility of complex trait loss has long been a tenet of evolutionary biology. However, this idea is increasingly at odds with the numerous documented exceptions across the Tree of Life. We synthesise this growing body of evidence across a diverse array of taxa and traits, exploring the evolutionary conditions that enable ...
Giobbe Forni   +4 more
wiley   +1 more source

Symbolic or Substantive Action: Intent, Effort, and Results

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Many firms have made ambitious climate pledges since the Paris Agreement of 2015. These pledges may be symbolic or substantive, but the literature is fragmented in defining these two terms. We propose a conceptual framework with three frames to delineate symbolic from substantive action: Intent—underlying motivations for engaging in climate ...
Vincent Xinyi Gu   +1 more
wiley   +1 more source

Jailbreak-Free LLM-Assisted Malware Generation: An Empirical and Conceptual Analysis

open access: yesIEEE Access
Recent studies have shown that large language models (LLMs) can be misused to generate malicious software, primarily by relying on explicit jailbreak techniques that circumvent built-in safety mechanisms.
Nobuyuki Sugio, Hokuto Ito
doaj   +1 more source

Rising Strong: Cultivating Resilience in Edible City Entrepreneurship. Insights Into the Landscape of Urban Food Initiatives

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT In response to growing global challenges, this study explores how social entrepreneurship within the Edible City movement contributes to building resilient, sustainable, and equitable urban food systems. Drawing on semistructured interviews with over 70 stakeholders across five cities—Berlin, Andernach, Oslo, Rotterdam, and Havana—we ...
Ina Säumel   +6 more
wiley   +1 more source

The Influence of Corporate Sustainability Rating Methodology on Disclosure Behavior

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The rise of environmental, social, and governance (ESG) investing has illuminated long‐standing concerns over the ability for sustainability rating schemes to accurately convey sustainability‐related performance of firms. This study theorizes and empirically examines how a detailed and transparent rating methodology influences what information
Patrick J. Callery
wiley   +1 more source

Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays

open access: yesCoRR, 2008
Array restructuring operations obscure arrays. Our work aims on java source code obfuscation containing arrays. Our main proposal is Classes with restructured array members and obscured member methods for setting, getting array elements and to get the length of arrays.
Praveen Sivadasan, P. Sojan Lal
openaire   +2 more sources

Home - About - Disclaimer - Privacy