Search

Your search keyword '"Obfuscation"' showing total 2,665 results

Search Constraints

Start Over You searched for: Descriptor "Obfuscation" Remove constraint Descriptor: "Obfuscation"
2,665 results on '"Obfuscation"'

Search Results

1. Tax-Related Restatements and Tax Avoidance Behavior.

2. Government subsidies and income smoothing.

3. Honor among Crooks: The Role of Trust in Obfuscated Disreputable Exchange

4. The Benefit of the Doubt: Patent Examination Under Strategic Obfuscation.

5. Analisis Malware Aquvaprn.exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics

6. Does Political Uncertainty Obfuscate Narrative Disclosure?

7. From object obfuscation to contextually-dependent identification: enhancing automated privacy protection in street-level image platforms (SLIPs).

8. GNN-Based Reverse Engineering Protection Using Obfuscation Through Electromagnetic Interference.

9. Making Alice Appear Like Bob: A Probabilistic Preference Obfuscation Method For Implicit Feedback Recommendation Models

10. Review of Various Approaches for Authorship Identification in Digital Forensics

11. Upgrading Fuzzy Extractors

13. Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation.

14. Performing secrecy: hiding and obfuscation in Frontex's pushbacks scandal.

15. Android Authorship Attribution Using Source Code-Based Features

16. Obfuscated Privacy Malware Classifiers Based on Memory Dumping Analysis

17. Manipulation and obfuscation of financial reports.

18. Obfuscation of Quality Information for Dual Bounded Rational Consumers.

19. The Power of Natural Properties as Oracles.

20. Development, detection and decipherment of obfuscated fingerprints in humans: Implications for forensic casework.

21. Malicious Office Macro Detection: Combined Features with Obfuscation and Suspicious Keywords.

22. New Obfuscation Scheme for Conjunctions.

23. OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

24. Libra: Library Identification in Obfuscated Android Apps

25. Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for Privacy

26. Obfuscating LLVM IR with the Application of Lambda Calculus

27. Hybrid Security Approach for Behavioural Privacy of Business Processes in a Cloud Environment

28. Privacy Protection Against Shoulder Surfing in Mobile Environments

29. A Novel Approach for Privacy Preserving Technique in IoT Fog and Cloud Environment

30. Detecting Spyware in Android Devices Using Random Forest

31. Android Malware Detection Against String Encryption Based Obfuscation

33. Optimizing Honey Traffic Using Game Theory and Adversarial Learning

34. MetaPriv: Acting in Favor of Privacy on Social Media Platforms

35. CPSOCKS: Cross-Platform Privacy Overlay Adapter Based on SOCKSv5 Protocol

36. Are our clone detectors good enough? An empirical study of code effects by obfuscation

37. Readability versus obfuscation to fight corruption: evidence from Italian local governments.

38. A Smart Obfuscation Approach to Protect Software in Cloud.

39. ObNoCs: Protecting Network-on-Chip Fabrics Against Reverse-Engineering Attacks.

40. Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips.

41. Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response.

42. Performance Evaluation of CNN and Pre-trained Models for Malware Classification.

46. Strategies for Subverting the Tyranny of the Corporate Map: An Interview with Babak Fakhamzadeh

47. Candidate iO from Homomorphic Encryption Schemes.

48. Are our clone detectors good enough? An empirical study of code effects by obfuscation.

49. Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments.

50. OATs'inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications.

Catalog

Books, media, physical & digital resources