Suggested Topics within your search.
Suggested Topics within your search.
human
4
Humans
3
Learning systems
3
Machine learning
3
Animals
2
Classification (of information)
2
Cryptography
2
Individuality
2
Male
2
Network security
2
QA75 Electronic computers. Computer science
2
Reaction Time
2
TK Electrical engineering. Electronics Nuclear engineering
2
United States
2
individuality
2
male
2
prediction
2
reaction time
2
API calls
1
Adult
1
Affinity propagation clustering
1
Age Factors
1
Aged
1
Aged, 80 and over
1
Algorithms
1
Analytical models
1
Android
1
Android (operating system)
1
Anti-forensics
1
Anti-populism
1
-
1“... that it is easy to detect the core knowledge in released programs. In this thesis, an obfuscation...”
Get full text
Others -
2“...Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a...”
Get full text
Article -
3
-
4
-
5by Batchelder, Michael Robert“...-securing the intellectual property of a Java program; obfuscation. Obfuscation of a program involves...”
Published 2007
Get full text
Others -
6by O'Kane, P. C.“... computer virus. Obfuscation is one of the latest strategies employed by malware writers to camouflage...”
Published 2014
Get full text
-
7by Varia, Mayank (Mayank Harshad)“... bibliographical references (p. 159-164). === Program obfuscation is the software analog to the problem of tamper...”
Published 2011
Get full text
Others -
8
-
9
-
10
-
11by N.P. Varnovsky“...In this paper we address the issue of defining security of program obfuscation. We argue...”
Published 2004-01-01
Get full text
Article -
12
-
13“..., obfuscation is one of the easiest and efficient way to achieve this goal. A good obfuscation tool can not only...”
Get full text
Others -
14
-
15by ARVIDSSON, OSKAR“...Code obfuscation is a technique used to make soft- ware more difficult to read and reverse engineer...”
Published 2014
Get full text
Others -
16
-
17by Paneth, Omer“...Code is said to be obfuscated if it is intentionally difficult for humans to understand...”
Published 2019
Get full text
-
18
-
19
-
20by Bitansky, Nir, Canetti, Ran, Goldwasser, Shafi, Halevi, Shai, Kalai, Yael Tauman, Rothblum, Guy N.Get fulltext
Published 2014
Article