Search

Your search keyword '"Obfuscation"' showing total 35 results

Search Constraints

Start Over You searched for: Descriptor "Obfuscation" Remove constraint Descriptor: "Obfuscation" Publisher springer singapore Remove constraint Publisher: springer singapore
35 results on '"Obfuscation"'

Search Results

1. A Systematic Approach for Evading Antiviruses Using Malware Obfuscation

2. Key-based Obfuscation of Digital Design for Hardware Security

3. Lightweight Logic Obfuscation in Combinational Circuits for Improved Security—An Analysis

4. Static and Dynamic Learning-Based PDF Malware Detection classifiers—A Comparative Study

6. Experimental Evaluation of the Obfuscation Techniques Against Reverse Engineering

7. Hardware Security for DSP Circuits Using Key-Based Time-Dependent Obfuscation

8. A Unified Methodology for Hardware Obfuscation and IP Watermarking

9. Data Obfuscation Using Secret Sharing

11. Android Anti-malware Techniques and Its Vulnerabilities: A Survey

12. A Comparative Analysis of Static and Dynamic Java Bytecode Watermarking Algorithms

13. Control Flow Graph Matching for Detecting Obfuscated Programs

15. EncryScation: An Secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment

16. Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications

17. Ensemble-Based Stegomalware Detection System for Hidden Ransomware Attack

18. Detection of Obfuscated Mobile Malware with Machine Learning and Deep Learning Models

19. Static and Dynamic Learning-Based PDF Malware Detection classifiers—A Comparative Study

20. Privacy Preserving Anti-forensic Techniques

21. CP-ABE with Hidden Access Policy and Outsourced Decryption for Cloud-Based EHR Applications

22. Experimental Evaluation of the Obfuscation Techniques Against Reverse Engineering

23. A Novel Approach for Analysing and Detection of Obfuscated Malware Payloads in Android Platform Using DexMonitor

24. A Large-Scale Investigation to Identify the Pattern of App Component in Obfuscated Android Malwares

25. Reconfigurable LUT-Based Dynamic Obfuscation for Hardware Security

26. Discretion and Obfuscation in Exclusions from Anti-trafficking

27. Towards a Novel Cross-media Encryption-Cum-Obfuscation Technique

28. Implementation of Blockchain Data Obfuscation

29. A Unified Methodology for Hardware Obfuscation and IP Watermarking

30. Preserving User Location Privacy in Era of Location-Based Services: Challenges, Techniques and Framework

31. Control Flow Graph Matching for Detecting Obfuscated Programs

32. Light Weight Two-Factor Authentication Using Hybrid PUF and FSM for SOC FPGA

33. ObfuCloud: An Enhanced Framework for Securing DaaS Services Using Data Obfuscation Mechanism in Cloud Environment

34. EncryScation: An Secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS Services in Cloud Environment

35. Effectiveness of Email Address Obfuscation on Internet

Catalog

Books, media, physical & digital resources