Journal articles on the topic 'Obfuscations'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Obfuscations.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nawaz, Umair, Muhammad Aleem, and Jerry Chun-Wei Lin. "On the evaluation of android malware detectors against code-obfuscation techniques." PeerJ Computer Science 8 (June 21, 2022): e1002. http://dx.doi.org/10.7717/peerj-cs.1002.
Full textVarnovskiy, N. P., V. A. Zakharov, N. N. Kuzyurin, and A. V. Shokurov. "The current state of art in program obfuscations: definitions of obfuscation security." Programming and Computer Software 41, no. 6 (November 2015): 361–72. http://dx.doi.org/10.1134/s0361768815060079.
Full textKessler, Samuel J., and Timothy L. Parrish. "Old Obfuscations and New Conversations." Philip Roth Studies 18, no. 1 (2022): 3–10. http://dx.doi.org/10.1353/prs.2022.0002.
Full textZhao, Yujie, Zhanyong Tang, Guixin Ye, Xiaoqing Gong, and Dingyi Fang. "Input-Output Example-Guided Data Deobfuscation on Binary." Security and Communication Networks 2021 (December 13, 2021): 1–16. http://dx.doi.org/10.1155/2021/4646048.
Full textLedesma, Alberto. "On the Grammar of Silence: The Structure of My Undocumented Immigrant Writer's Block." Harvard Educational Review 85, no. 3 (September 1, 2015): 415–26. http://dx.doi.org/10.17763/0017-8055.85.3.415.
Full textAlam, Shahid, and Ibrahim Sogukpinar. "DroidClone: Attack of the android malware clones - a step towards stopping them." Computer Science and Information Systems, no. 00 (2020): 35. http://dx.doi.org/10.2298/csis200330035a.
Full textKapse, Gunjan, and Aruna Gupta. "Testing Android Anti-Malware against Malware Obfuscations." International Journal of Computer Applications 111, no. 17 (February 18, 2015): 6–9. http://dx.doi.org/10.5120/19755-1140.
Full textRoundy, Kevin A., and Barton P. Miller. "Binary-code obfuscations in prevalent packer tools." ACM Computing Surveys 46, no. 1 (October 2013): 1–32. http://dx.doi.org/10.1145/2522968.2522972.
Full textChawdhary, Aziem, Ranjeet Singh, and Andy King. "Partial evaluation of string obfuscations for Java malware detection." Formal Aspects of Computing 29, no. 1 (February 19, 2016): 33–55. http://dx.doi.org/10.1007/s00165-016-0357-3.
Full textSewak, Mohit, Sanjay K. Sahay, and Hemant Rathore. "DRLDO A Novel DRL based De obfuscation System for Defence Against Metamorphic Malware." Defence Science Journal 71, no. 1 (February 1, 2021): 55–65. http://dx.doi.org/10.14429/dsj.71.15780.
Full textPias, Sabid Bin Habib, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, and Adam J. Lee. "Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (November 7, 2022): 1–30. http://dx.doi.org/10.1145/3555538.
Full textMills, Mary Beth. "Rural-Urban Obfuscations: thinking about urban anthropology and labor migration in Thailand." City Society 13, no. 2 (July 2001): 177–82. http://dx.doi.org/10.1525/city.2001.13.2.177.
Full textHanlon, Andrew D., and Bratoljub H. Milosavljevic. "Appropriate excitation wavelength removes obfuscations from pyrene excimer kinetics and mechanism studies." Photochemical & Photobiological Sciences 12, no. 5 (2013): 787. http://dx.doi.org/10.1039/c2pp25307k.
Full textCui, Aijiao, Yanhui Luo, and Chip-Hong Chang. "Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks." IEEE Transactions on Information Forensics and Security 12, no. 2 (February 2017): 363–76. http://dx.doi.org/10.1109/tifs.2016.2613847.
Full textSchoenhals, Michael. "“Why Don't We Arm the Left?” Mao's Culpability for the Cultural Revolution's “Great Chaos” of 1967." China Quarterly 182 (June 2005): 277–300. http://dx.doi.org/10.1017/s0305741005000196.
Full textHomoliak, Ivan, Martin Teknös, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, and Petr Hanacek. "Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach." ICST Transactions on Security and Safety 5, no. 17 (January 10, 2019): 156245. http://dx.doi.org/10.4108/eai.10-1-2019.156245.
Full textTomczak, Philippa, and Róisín Mulgrew. "Making prisoner deaths visible: Towards a new epistemological approach." Incarceration 4 (January 2023): 263266632311603. http://dx.doi.org/10.1177/26326663231160344.
Full textWalters, James. "Small-screen psychics: Television performance as dubious achievement." Journal of Popular Television 8, no. 3 (October 1, 2020): 349–67. http://dx.doi.org/10.1386/jptv_00034_1.
Full textZamiri Azar, Kimia, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, Christos P. Sotiriou, and Avesta Sasan. "Data Flow Obfuscation: A New Paradigm for Obfuscating Circuits." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29, no. 4 (April 2021): 643–56. http://dx.doi.org/10.1109/tvlsi.2021.3060345.
Full textPark, Kim, and Kim. "A Mechanism of Masking Identification Information regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission." Electronics 8, no. 7 (June 28, 2019): 735. http://dx.doi.org/10.3390/electronics8070735.
Full textAbbas, Ghulam, Amjad Mehmood, Maple Carsten, Gregory Epiphaniou, and Jaime Lloret. "Safety, Security and Privacy in Machine Learning Based Internet of Things." Journal of Sensor and Actuator Networks 11, no. 3 (July 29, 2022): 38. http://dx.doi.org/10.3390/jsan11030038.
Full textDunaev, Dmitriy, and László Lengyel. "Parametrization and Evaluation of Intermediate Level Obfuscator." International Journal of Software Engineering and Knowledge Engineering 27, no. 07 (September 2017): 995–1011. http://dx.doi.org/10.1142/s0218194017500371.
Full textDespres, Charles Jean-Noel. "Culture, surveys, culture surveys and other obfuscations a reply to Migliore and Martin. A reply to Migliore and Martin." Strategic Change 4, no. 2 (March 1995): 65–75. http://dx.doi.org/10.1002/jsc.4240040202.
Full textNacer, Amina Ahmed, Elio Goettelmann, Samir Youcef, Abdelkamel Tari, and Claude Godart. "A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment." International Journal of Web Services Research 15, no. 4 (October 2018): 61–81. http://dx.doi.org/10.4018/ijwsr.2018100104.
Full textBehera, Chandan Kumar, and D. Lalitha Bhaskari. "Self-Modifying Code." International Journal of Secure Software Engineering 8, no. 3 (July 2017): 24–41. http://dx.doi.org/10.4018/ijsse.2017070102.
Full textHurl, Chris. "A Militancy of Invidious Comparisons." Labour / Le Travail 89 (May 27, 2022): 235–61. http://dx.doi.org/10.52975/llt.2022v89.009.
Full textRepel, Dusan, and Ingo Stengel. "Grammar-based transformations: attack and defence." Information Management & Computer Security 22, no. 2 (June 3, 2014): 141–54. http://dx.doi.org/10.1108/imcs-09-2013-0071.
Full textHue, Axelle, Gaurav Sharma, and Jean-Michel Dricot. "Privacy-Enhanced MQTT Protocol for Massive IoT." Electronics 11, no. 1 (December 27, 2021): 70. http://dx.doi.org/10.3390/electronics11010070.
Full textHULIČ, Michal, Martin CHOVANEC, and Viliam KORBA. "VIRTUAL SYSTEM OBFUSCATION." Acta Electrotechnica et Informatica 19, no. 3 (December 4, 2019): 27–33. http://dx.doi.org/10.15546/aeei-2019-0020.
Full textRaval, Nisarg, Ashwin Machanavajjhala, and Jerry Pan. "Olympus: Sensor Privacy through Utility Aware Obfuscation." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 5–25. http://dx.doi.org/10.2478/popets-2019-0002.
Full textHughes, David A. "“Covid-19 Vaccines” for Children in the UK: A Tale of Establishment Corruption." International Journal of Vaccine Theory, Practice, and Research 2, no. 1 (February 11, 2022): 209–47. http://dx.doi.org/10.56098/ijvtpr.v2i1.35.
Full textRauti, Sampsa, Janne Lahtiranta, Heidi Parisod, Sami Hyrynsalmi, Sanna Salanterä, Minna Elisabeth Aromaa, Jouni Smed, and Ville Leppänen. "A Proxy-Based Solution for Asynchronous Telemedical Systems." International Journal of E-Health and Medical Communications 8, no. 3 (July 2017): 70–83. http://dx.doi.org/10.4018/ijehmc.2017070105.
Full textKLEINE, BERNHARD. "Obfuscation." Nature 337, no. 6206 (February 1989): 402. http://dx.doi.org/10.1038/337402f0.
Full textGhaleb, Fuad A., Mohammed Alsaedi, Faisal Saeed, Jawad Ahmad, and Mohammed Alasli. "Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning." Sensors 22, no. 9 (April 28, 2022): 3373. http://dx.doi.org/10.3390/s22093373.
Full textHolden, Constance. "Eternal Obfuscation." Science 251, no. 4994 (February 8, 1991): 622. http://dx.doi.org/10.1126/science.251.4994.622.d.
Full textHolden, Constance. "Eternal Obfuscation." Science 251, no. 4994 (February 8, 1991): 622. http://dx.doi.org/10.1126/science.251.4994.622-d.
Full textKingston, Tigga. "Eptesicus Obfuscation." BioScience 62, no. 4 (April 2012): 436–38. http://dx.doi.org/10.1525/bio.2012.62.4.15.
Full textAlonso, Marcelo. "Eschew obfuscation." Physics Teacher 29, no. 9 (December 1991): 549–50. http://dx.doi.org/10.1119/1.2343421.
Full textHoldzkom, Marianne. "Enjoyed Obfuscation." Film & History: An Interdisciplinary Journal of Film and Television Studies 37, no. 2 (2007): 112–13. http://dx.doi.org/10.1353/flm.2007.0053.
Full textEllis, Chris. "Philological Obfuscation." South African Family Practice 51, no. 3 (May 2009): 268. http://dx.doi.org/10.1080/20786204.2009.10873861.
Full textRoeder, Tom, and Fred B. Schneider. "Proactive obfuscation." ACM Transactions on Computer Systems 28, no. 2 (July 2010): 1–54. http://dx.doi.org/10.1145/1813654.1813655.
Full textFRIEDMAN, E., and J. PENNISI. "Eschew obfuscation." Obstetrics & Gynecology 87 (May 1996): 795–96. http://dx.doi.org/10.1016/0029-7844(96)00014-2.
Full textPearlman, Alan S. "Obfuscation, Revisited." Journal of the American Society of Echocardiography 23, no. 4 (April 2010): 448–49. http://dx.doi.org/10.1016/j.echo.2010.03.004.
Full textPatel, Himanshu, Deep Patel, Jaspreet Ahluwalia, Vaishali Kapoor, Karthik Narasimhan, Harmanpreet Singh, Harmanjot Kaur, Gadi Harshitha Reddy, Sai Sushma Peruboina, and Sergey Butakov. "Evaluation of Survivability of the Automatically Obfuscated Android Malware." Applied Sciences 12, no. 10 (May 14, 2022): 4969. http://dx.doi.org/10.3390/app12104969.
Full textAlharbi, Rahaf, Robin N. Brewer, and Sarita Schoenebeck. "Understanding Emerging Obfuscation Technologies in Visual Description Services for Blind and Low Vision People." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (November 7, 2022): 1–33. http://dx.doi.org/10.1145/3555570.
Full textHashemzade, Bahare, and Ali Maroosi. "Hybrid Obfuscation Using Signals and Encryption." Journal of Computer Networks and Communications 2018 (2018): 1–6. http://dx.doi.org/10.1155/2018/6873807.
Full textMatsuoka, Yuumi, Naoki Fujieda, and Shuichi Ichikawa. "Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM." IEEJ Transactions on Industry Applications 139, no. 2 (February 1, 2019): 111–18. http://dx.doi.org/10.1541/ieejias.139.111.
Full textBullock, Katherine. "Modest Fashion." American Journal of Islam and Society 32, no. 3 (July 1, 2015): 121–23. http://dx.doi.org/10.35632/ajis.v32i3.996.
Full textHai, Nguyen Minh. "A STATISTICAL APPROACH FOR PACKER IDENTIFICATION." Vietnam Journal of Science and Technology 54, no. 3A (March 20, 2018): 129. http://dx.doi.org/10.15625/2525-2518/54/3a/11966.
Full textWiener, Richard. "Obfuscation and .NET." Journal of Object Technology 4, no. 4 (2005): 73. http://dx.doi.org/10.5381/jot.2005.4.4.c6.
Full text