Search

Your search keyword '"Obfuscation (software)"' showing total 1,532 results

Search Constraints

Start Over You searched for: Descriptor "Obfuscation (software)" Remove constraint Descriptor: "Obfuscation (software)"
1,532 results on '"Obfuscation (software)"'

Search Results

1. ObfusX: Routing obfuscation with explanatory analysis of a machine learning attack

2. XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses

3. Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture

4. Android malware obfuscation variants detection method based on multi-granularity opcode features

5. Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques

6. Eight Years of Rider Measurement in the Android Malware Ecosystem

7. Compiling and Analyzing Open Source Malware for Research Purposes

8. MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things

9. Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation

10. Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection

11. CShield: Enabling code privacy for Cyber–Physical systems

12. Reason-giving for resistance: obfuscation, justification and earmarking in resisting informal financial assistance

13. A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects

14. Efficient Key-Gate Placement and Dynamic Scan Obfuscation Towards Robust Logic Encryption

15. WATERMARCH: IP Protection Through Authenticated Obfuscation in FPGA Bitstreams

16. Optimal Packet Camouflage Against Traffic Analysis

17. From innovation to obfuscation: continuous time finance fifty years later

18. PhaseCamouflage: Leveraging Adiabatic Operation to Thwart Reverse Engineering

19. Surveillance Concerns as Predictors of Obfuscation and the Chilling Effect in the Context of a Pandemic

20. Provably Secure Sequential Obfuscation for IC Metering and Piracy Avoidance

21. Preventing DNN Model IP Theft via Hardware Obfuscation

22. Malware detection and classification using community detection and social network analysis

23. Markhor: malware detection using fuzzy similarity of system call dependency sequences

24. Infrastructural obfuscation: unpacking the carceral logics of the Ring surveillant assemblage

25. Data Flow Obfuscation: A New Paradigm for Obfuscating Circuits

26. On Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations

27. Webshell Detection Based on Executable Data Characteristics of PHP Code

28. On the Limitations of Obfuscating Redundant Circuits in Frustrating Hardware Trojan Implantation

30. Cut-and-Mouse and Ghost Control

31. DRLDO A Novel DRL based De obfuscation System for Defence Against Metamorphic Malware

32. Measuring Software Obfuscation Quality–A Systematic Literature Review

33. An Efficient Hybrid Webshell Detection Method for Webserver of Marine Transportation Systems

34. Public-Key Projective Arithmetic Functional Encryption

35. Obfuscation of logic schemes of pseudo-random number generators based on linear and non-linear feedback shift registers

36. Price Fairness and Strategic Obfuscation

37. Encryption of pseudorandom number generator logic circuits

38. Comments on 'Efficient Public Verification of Data Integrity for Cloud Storage Systems From Indistinguishability Obfuscation'

39. Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools

40. Automated Multi-Layered Bytecode Generation for Preventing Sensitive Information Leaks From Android Applications

41. The Challenge of Only One Flow Problem for Traffic Classification in Identity Obfuscation Environments

42. SARO: Scalable Attack-Resistant Logic Locking

43. SAIL: Analyzing Structural Artifacts of Logic Locking Using Machine Learning

44. Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning

45. Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection

46. SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation

47. Hybrid Obfuscation Technique for Reverse Engineering Problems

48. A Survey of Android Malware Detection with Deep Neural Models

49. Obstruction and obfuscation: Regulatory barriers to human embryo research in New Zealand

50. Logic Obfuscation Through Enhanced Threshold Voltage Defined Logic Family

Catalog

Books, media, physical & digital resources