Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by  and +2
    •   8  
      PolymorphismComputer SecurityComputer VirusesHandwriting Recognition
    • by 
    • Obfuscation
    • by 
    •   4  
      Data MiningIntrusion DetectionApiObfuscation
    • by 
    •   6  
      Computer ScienceProgramming LanguagesInformation SecurityComputer Security
    • by 
    •   9  
      Speaker RecognitionBiometricsAuthenticationSpeech Processing
    • by  and +1
    •   6  
      Corporate CommunicationEvaluationCritical Discourse AnalysisMetaphor
    • by 
    •   4  
      Software MaintenanceReverse EngineeringSoftware MetricsObfuscation
    • by 
    •   28  
      Signal ProcessingAlgorithmMultidisciplinaryState Estimation
    • by 
    •   14  
      MarketingEconometricsEconomic TheoryRetail
    • by 
    •   13  
      Network FlowsEncryptionSecurity and PrivacyKnowledge Engineering
    • by 
    •   8  
      Information SystemsSoftware SecurityAbstract InterpretationComputer Software
Automated Fingerprint Identification Systems (AFIS) is deployed in law authorization and fringe control applications. This has elevated the requirement for guaranteeing that these frameworks are not traded off. A few issues identified... more
    • by 
    •   3  
      Computer ScienceAlterationObfuscation
    • by 
    •   9  
      Computer ScienceMachine LearningWeb searchCase Study
    • by 
    •   14  
      Computer ScienceAlgorithmsAnalytical ChemistryPrivacy
    • by 
    • Obfuscation
    • by 
    •   9  
      Computer ScienceArtReverse EngineeringComputational Science and Engineering
    • by 
    •   9  
      Distributed ComputingPrivacySecurityVisual Analytics
Imagine there is certain content we want to maintain private until some particular event occurs, when we want to have it automatically disclosed. Suppose furthermore, that we want this done in a (possibly) malicious host. Say, the... more
    • by 
    •   8  
      Information SystemsComputer ScienceComputer SoftwareMobile Code
    • by 
    •   9  
      Computer SciencePediatricsDatabasesDatabase Management Systems
    • by 
    •   6  
      Computer ScienceComputer SecurityComputer SoftwareDisclosure
    • by 
    •   3  
      Location Based ServicesPrivacyObfuscation
    • by 
    •   3  
      Access ControlPrivacy PolicyObfuscation
    • by 
    •   8  
      Information SystemsSoftware SecurityAbstract InterpretationComputer Software
    • by 
    •   11  
      HistoryComputer ArchitectureData MiningSoftware Testing
    • by 
    •   4  
      Intellectual Property ProtectionInterceptionObfuscationFinite State Machine
Abstract—An obfuscation aims to transform a program, with-out affecting its functionality, so that some secret information within the program can be hidden for as long as possible from an adversary armed with reverse engineering tools.... more
    • by  and +1
    •   9  
      Computer ScienceLogicManufacturingWriting
    • by 
    •   4  
      Computer ScienceComputer SecurityMalwareObfuscation
    • by 
    •   5  
      Computer ScienceComputer ApplicationsObfuscationMetamorphic
    • by 
    •   11  
      Computer ScienceSPAMNegativeSpam Detection
Title of Thesis: SECURITY THROUGH OBSCURITY: LAYOUT OBFUSCATION OF DIGITAL INTEGRATED CIRCUITS USING DON’T CARE CONDITIONS Sana Mehmood Awan, Master of Science, 2015 Directed By: Professor Gang Qu, Department of Electrical and Computer... more
    • by 
    •   2  
      Computer ScienceObfuscation
    • by 
    •   9  
      Generic ProgrammingMobile InteractionMobile AgentSource Code
    • by 
    •   6  
      EconomicsPolitical ScienceEuropean Union PoliticsCross Section
Abstract. There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transformations which are grouped under the term... more
    • by 
    •   5  
      Static AnalysisProgram AnalysisInformation HidingObfuscation
As location-based services emerge, many people feel exposed to high privacy threats. Privacy protection is a major challenge for such applications. A broadly used approach is perturbation, which adds an artificial noise to positions and... more
    • by 
    •   4  
      Location Based ServicesPrivacyObfuscationPerturbation
    • by 
    •   2  
      Intrusion DetectionObfuscation
    • by 
    •   6  
      SemanticsGeneric ProgrammingSource CodeObfuscation
Whether we accept it or not, computer systems and the op-erating systems that direct them are at the heart of major forms of malicious activity. Criminals can use computers as the actual target of their malicious activity (stealing funds... more
    • by 
    •   11  
      Operating SystemsForensic ScienceCryptographyEncryption
Zimbabwe " s pro-democracy groups have alleged significant information security breaches of voters " personal data ahead of the Monday 30 July elections. While there haven " t been any reported significant network disruptions so far,... more
    • by 
    •   4  
      Biometrics And IdentityBiometrics Authentication TechnologiesBiometric SecurityObfuscation
    • by 
    •   2  
      Compiler OptimizationObfuscation
A new approach to software metrics using concepts from information theory, data compression, complexity theory and analogies with real physical systems is described. A novel application of software obfuscation allows an existing software... more
    • by 
    •   13  
      Information SystemsThermodynamicsInformation TheoryComplexity Theory
    • by 
    •   11  
      SemanticsPrivacyWeb searchSearch Engines
In this paper, we propose an obfuscation/ deobfuscation based technique to detect the presence of possible SQL Injection Attacks (SQLIA) in a query before submitting it to a DBMS. This technique combines static and dynamic analysis. In... more
    • by 
    •   8  
      PediatricsDatabasesDatabase Management SystemsFeature Extraction