Статті в журналах з теми "Obfuscations"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Obfuscations".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Nawaz, Umair, Muhammad Aleem, and Jerry Chun-Wei Lin. "On the evaluation of android malware detectors against code-obfuscation techniques." PeerJ Computer Science 8 (June 21, 2022): e1002. http://dx.doi.org/10.7717/peerj-cs.1002.
Повний текст джерелаVarnovskiy, N. P., V. A. Zakharov, N. N. Kuzyurin, and A. V. Shokurov. "The current state of art in program obfuscations: definitions of obfuscation security." Programming and Computer Software 41, no. 6 (November 2015): 361–72. http://dx.doi.org/10.1134/s0361768815060079.
Повний текст джерелаKessler, Samuel J., and Timothy L. Parrish. "Old Obfuscations and New Conversations." Philip Roth Studies 18, no. 1 (2022): 3–10. http://dx.doi.org/10.1353/prs.2022.0002.
Повний текст джерелаZhao, Yujie, Zhanyong Tang, Guixin Ye, Xiaoqing Gong, and Dingyi Fang. "Input-Output Example-Guided Data Deobfuscation on Binary." Security and Communication Networks 2021 (December 13, 2021): 1–16. http://dx.doi.org/10.1155/2021/4646048.
Повний текст джерелаLedesma, Alberto. "On the Grammar of Silence: The Structure of My Undocumented Immigrant Writer's Block." Harvard Educational Review 85, no. 3 (September 1, 2015): 415–26. http://dx.doi.org/10.17763/0017-8055.85.3.415.
Повний текст джерелаAlam, Shahid, and Ibrahim Sogukpinar. "DroidClone: Attack of the android malware clones - a step towards stopping them." Computer Science and Information Systems, no. 00 (2020): 35. http://dx.doi.org/10.2298/csis200330035a.
Повний текст джерелаKapse, Gunjan, and Aruna Gupta. "Testing Android Anti-Malware against Malware Obfuscations." International Journal of Computer Applications 111, no. 17 (February 18, 2015): 6–9. http://dx.doi.org/10.5120/19755-1140.
Повний текст джерелаRoundy, Kevin A., and Barton P. Miller. "Binary-code obfuscations in prevalent packer tools." ACM Computing Surveys 46, no. 1 (October 2013): 1–32. http://dx.doi.org/10.1145/2522968.2522972.
Повний текст джерелаChawdhary, Aziem, Ranjeet Singh, and Andy King. "Partial evaluation of string obfuscations for Java malware detection." Formal Aspects of Computing 29, no. 1 (February 19, 2016): 33–55. http://dx.doi.org/10.1007/s00165-016-0357-3.
Повний текст джерелаSewak, Mohit, Sanjay K. Sahay, and Hemant Rathore. "DRLDO A Novel DRL based De obfuscation System for Defence Against Metamorphic Malware." Defence Science Journal 71, no. 1 (February 1, 2021): 55–65. http://dx.doi.org/10.14429/dsj.71.15780.
Повний текст джерелаPias, Sabid Bin Habib, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, and Adam J. Lee. "Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (November 7, 2022): 1–30. http://dx.doi.org/10.1145/3555538.
Повний текст джерелаMills, Mary Beth. "Rural-Urban Obfuscations: thinking about urban anthropology and labor migration in Thailand." City Society 13, no. 2 (July 2001): 177–82. http://dx.doi.org/10.1525/city.2001.13.2.177.
Повний текст джерелаHanlon, Andrew D., and Bratoljub H. Milosavljevic. "Appropriate excitation wavelength removes obfuscations from pyrene excimer kinetics and mechanism studies." Photochemical & Photobiological Sciences 12, no. 5 (2013): 787. http://dx.doi.org/10.1039/c2pp25307k.
Повний текст джерелаCui, Aijiao, Yanhui Luo, and Chip-Hong Chang. "Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks." IEEE Transactions on Information Forensics and Security 12, no. 2 (February 2017): 363–76. http://dx.doi.org/10.1109/tifs.2016.2613847.
Повний текст джерелаSchoenhals, Michael. "“Why Don't We Arm the Left?” Mao's Culpability for the Cultural Revolution's “Great Chaos” of 1967." China Quarterly 182 (June 2005): 277–300. http://dx.doi.org/10.1017/s0305741005000196.
Повний текст джерелаHomoliak, Ivan, Martin Teknös, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini та Petr Hanacek. "Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach". ICST Transactions on Security and Safety 5, № 17 (10 січня 2019): 156245. http://dx.doi.org/10.4108/eai.10-1-2019.156245.
Повний текст джерелаTomczak, Philippa, and Róisín Mulgrew. "Making prisoner deaths visible: Towards a new epistemological approach." Incarceration 4 (January 2023): 263266632311603. http://dx.doi.org/10.1177/26326663231160344.
Повний текст джерелаWalters, James. "Small-screen psychics: Television performance as dubious achievement." Journal of Popular Television 8, no. 3 (October 1, 2020): 349–67. http://dx.doi.org/10.1386/jptv_00034_1.
Повний текст джерелаZamiri Azar, Kimia, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, Christos P. Sotiriou, and Avesta Sasan. "Data Flow Obfuscation: A New Paradigm for Obfuscating Circuits." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29, no. 4 (April 2021): 643–56. http://dx.doi.org/10.1109/tvlsi.2021.3060345.
Повний текст джерелаPark, Kim, and Kim. "A Mechanism of Masking Identification Information regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission." Electronics 8, no. 7 (June 28, 2019): 735. http://dx.doi.org/10.3390/electronics8070735.
Повний текст джерелаAbbas, Ghulam, Amjad Mehmood, Maple Carsten, Gregory Epiphaniou, and Jaime Lloret. "Safety, Security and Privacy in Machine Learning Based Internet of Things." Journal of Sensor and Actuator Networks 11, no. 3 (July 29, 2022): 38. http://dx.doi.org/10.3390/jsan11030038.
Повний текст джерелаDunaev, Dmitriy, and László Lengyel. "Parametrization and Evaluation of Intermediate Level Obfuscator." International Journal of Software Engineering and Knowledge Engineering 27, no. 07 (September 2017): 995–1011. http://dx.doi.org/10.1142/s0218194017500371.
Повний текст джерелаDespres, Charles Jean-Noel. "Culture, surveys, culture surveys and other obfuscations a reply to Migliore and Martin. A reply to Migliore and Martin." Strategic Change 4, no. 2 (March 1995): 65–75. http://dx.doi.org/10.1002/jsc.4240040202.
Повний текст джерелаNacer, Amina Ahmed, Elio Goettelmann, Samir Youcef, Abdelkamel Tari, and Claude Godart. "A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment." International Journal of Web Services Research 15, no. 4 (October 2018): 61–81. http://dx.doi.org/10.4018/ijwsr.2018100104.
Повний текст джерелаBehera, Chandan Kumar, and D. Lalitha Bhaskari. "Self-Modifying Code." International Journal of Secure Software Engineering 8, no. 3 (July 2017): 24–41. http://dx.doi.org/10.4018/ijsse.2017070102.
Повний текст джерелаHurl, Chris. "A Militancy of Invidious Comparisons." Labour / Le Travail 89 (May 27, 2022): 235–61. http://dx.doi.org/10.52975/llt.2022v89.009.
Повний текст джерелаRepel, Dusan, and Ingo Stengel. "Grammar-based transformations: attack and defence." Information Management & Computer Security 22, no. 2 (June 3, 2014): 141–54. http://dx.doi.org/10.1108/imcs-09-2013-0071.
Повний текст джерелаHue, Axelle, Gaurav Sharma, and Jean-Michel Dricot. "Privacy-Enhanced MQTT Protocol for Massive IoT." Electronics 11, no. 1 (December 27, 2021): 70. http://dx.doi.org/10.3390/electronics11010070.
Повний текст джерелаHULIČ, Michal, Martin CHOVANEC, and Viliam KORBA. "VIRTUAL SYSTEM OBFUSCATION." Acta Electrotechnica et Informatica 19, no. 3 (December 4, 2019): 27–33. http://dx.doi.org/10.15546/aeei-2019-0020.
Повний текст джерелаRaval, Nisarg, Ashwin Machanavajjhala, and Jerry Pan. "Olympus: Sensor Privacy through Utility Aware Obfuscation." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 5–25. http://dx.doi.org/10.2478/popets-2019-0002.
Повний текст джерелаHughes, David A. "“Covid-19 Vaccines” for Children in the UK: A Tale of Establishment Corruption." International Journal of Vaccine Theory, Practice, and Research 2, no. 1 (February 11, 2022): 209–47. http://dx.doi.org/10.56098/ijvtpr.v2i1.35.
Повний текст джерелаRauti, Sampsa, Janne Lahtiranta, Heidi Parisod, Sami Hyrynsalmi, Sanna Salanterä, Minna Elisabeth Aromaa, Jouni Smed, and Ville Leppänen. "A Proxy-Based Solution for Asynchronous Telemedical Systems." International Journal of E-Health and Medical Communications 8, no. 3 (July 2017): 70–83. http://dx.doi.org/10.4018/ijehmc.2017070105.
Повний текст джерелаKLEINE, BERNHARD. "Obfuscation." Nature 337, no. 6206 (February 1989): 402. http://dx.doi.org/10.1038/337402f0.
Повний текст джерелаGhaleb, Fuad A., Mohammed Alsaedi, Faisal Saeed, Jawad Ahmad, and Mohammed Alasli. "Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning." Sensors 22, no. 9 (April 28, 2022): 3373. http://dx.doi.org/10.3390/s22093373.
Повний текст джерелаHolden, Constance. "Eternal Obfuscation." Science 251, no. 4994 (February 8, 1991): 622. http://dx.doi.org/10.1126/science.251.4994.622.d.
Повний текст джерелаHolden, Constance. "Eternal Obfuscation." Science 251, no. 4994 (February 8, 1991): 622. http://dx.doi.org/10.1126/science.251.4994.622-d.
Повний текст джерелаKingston, Tigga. "Eptesicus Obfuscation." BioScience 62, no. 4 (April 2012): 436–38. http://dx.doi.org/10.1525/bio.2012.62.4.15.
Повний текст джерелаAlonso, Marcelo. "Eschew obfuscation." Physics Teacher 29, no. 9 (December 1991): 549–50. http://dx.doi.org/10.1119/1.2343421.
Повний текст джерелаHoldzkom, Marianne. "Enjoyed Obfuscation." Film & History: An Interdisciplinary Journal of Film and Television Studies 37, no. 2 (2007): 112–13. http://dx.doi.org/10.1353/flm.2007.0053.
Повний текст джерелаEllis, Chris. "Philological Obfuscation." South African Family Practice 51, no. 3 (May 2009): 268. http://dx.doi.org/10.1080/20786204.2009.10873861.
Повний текст джерелаRoeder, Tom, and Fred B. Schneider. "Proactive obfuscation." ACM Transactions on Computer Systems 28, no. 2 (July 2010): 1–54. http://dx.doi.org/10.1145/1813654.1813655.
Повний текст джерелаFRIEDMAN, E., and J. PENNISI. "Eschew obfuscation." Obstetrics & Gynecology 87 (May 1996): 795–96. http://dx.doi.org/10.1016/0029-7844(96)00014-2.
Повний текст джерелаPearlman, Alan S. "Obfuscation, Revisited." Journal of the American Society of Echocardiography 23, no. 4 (April 2010): 448–49. http://dx.doi.org/10.1016/j.echo.2010.03.004.
Повний текст джерелаPatel, Himanshu, Deep Patel, Jaspreet Ahluwalia, Vaishali Kapoor, Karthik Narasimhan, Harmanpreet Singh, Harmanjot Kaur, Gadi Harshitha Reddy, Sai Sushma Peruboina, and Sergey Butakov. "Evaluation of Survivability of the Automatically Obfuscated Android Malware." Applied Sciences 12, no. 10 (May 14, 2022): 4969. http://dx.doi.org/10.3390/app12104969.
Повний текст джерелаAlharbi, Rahaf, Robin N. Brewer, and Sarita Schoenebeck. "Understanding Emerging Obfuscation Technologies in Visual Description Services for Blind and Low Vision People." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (November 7, 2022): 1–33. http://dx.doi.org/10.1145/3555570.
Повний текст джерелаHashemzade, Bahare, and Ali Maroosi. "Hybrid Obfuscation Using Signals and Encryption." Journal of Computer Networks and Communications 2018 (2018): 1–6. http://dx.doi.org/10.1155/2018/6873807.
Повний текст джерелаMatsuoka, Yuumi, Naoki Fujieda, and Shuichi Ichikawa. "Evaluation of Hardware Obfuscation Techniques using Obfuscation Tool oLLVM." IEEJ Transactions on Industry Applications 139, no. 2 (February 1, 2019): 111–18. http://dx.doi.org/10.1541/ieejias.139.111.
Повний текст джерелаBullock, Katherine. "Modest Fashion." American Journal of Islam and Society 32, no. 3 (July 1, 2015): 121–23. http://dx.doi.org/10.35632/ajis.v32i3.996.
Повний текст джерелаHai, Nguyen Minh. "A STATISTICAL APPROACH FOR PACKER IDENTIFICATION." Vietnam Journal of Science and Technology 54, no. 3A (March 20, 2018): 129. http://dx.doi.org/10.15625/2525-2518/54/3a/11966.
Повний текст джерелаWiener, Richard. "Obfuscation and .NET." Journal of Object Technology 4, no. 4 (2005): 73. http://dx.doi.org/10.5381/jot.2005.4.4.c6.
Повний текст джерела