Results 71 to 80 of about 22,093 (250)
IMPLEMENTASI TEKNIK OBFUSCATION PADA SOURCE CODE PHP DENGAN ALGORITMA RIVEST CIPHER 4
Aplikasi web merupakan suatu aplikasi dengan konsep client server yang dapat membentuk halaman-halaman website berdasarkan permintaan pengguna. Salah satu teknologi open source yang sangat banyak digunakan untuk membangun website adalah PHP. Sayangnya aplikasi website dengan teknologi open source berbasis PHP harus didistribusikan dalam bentuk source ...
Ramadhan, Artono Dwi +2 more
openaire +3 more sources
Abstract Bourdieu's sociological concept of social capital highlights its significance in enabling individuals to access other forms of capital for personal advantage. In the literature on university students' employability, particularly that concerning international and non‐local students, social capital is widely recognised as a key asset, alongside ...
Fang Gao, Thanh Pham
wiley +1 more source
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj
Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core
Loss, persistence and reversal of phenotypic traits
ABSTRACT The irreversibility of complex trait loss has long been a tenet of evolutionary biology. However, this idea is increasingly at odds with the numerous documented exceptions across the Tree of Life. We synthesise this growing body of evidence across a diverse array of taxa and traits, exploring the evolutionary conditions that enable ...
Giobbe Forni +4 more
wiley +1 more source
Symbolic or Substantive Action: Intent, Effort, and Results
ABSTRACT Many firms have made ambitious climate pledges since the Paris Agreement of 2015. These pledges may be symbolic or substantive, but the literature is fragmented in defining these two terms. We propose a conceptual framework with three frames to delineate symbolic from substantive action: Intent—underlying motivations for engaging in climate ...
Vincent Xinyi Gu +1 more
wiley +1 more source
Jailbreak-Free LLM-Assisted Malware Generation: An Empirical and Conceptual Analysis
Recent studies have shown that large language models (LLMs) can be misused to generate malicious software, primarily by relying on explicit jailbreak techniques that circumvent built-in safety mechanisms.
Nobuyuki Sugio, Hokuto Ito
doaj +1 more source
ABSTRACT In response to growing global challenges, this study explores how social entrepreneurship within the Edible City movement contributes to building resilient, sustainable, and equitable urban food systems. Drawing on semistructured interviews with over 70 stakeholders across five cities—Berlin, Andernach, Oslo, Rotterdam, and Havana—we ...
Ina Säumel +6 more
wiley +1 more source
The Influence of Corporate Sustainability Rating Methodology on Disclosure Behavior
ABSTRACT The rise of environmental, social, and governance (ESG) investing has illuminated long‐standing concerns over the ability for sustainability rating schemes to accurately convey sustainability‐related performance of firms. This study theorizes and empirically examines how a detailed and transparent rating methodology influences what information
Patrick J. Callery
wiley +1 more source
Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays
Array restructuring operations obscure arrays. Our work aims on java source code obfuscation containing arrays. Our main proposal is Classes with restructured array members and obscured member methods for setting, getting array elements and to get the length of arrays.
Praveen Sivadasan, P. Sojan Lal
openaire +2 more sources

