-
1
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Published 2025-01-01Subjects: “…code obfuscation…”
Get full text
Article -
2
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01Subjects: “…code obfuscation…”
Get full text
Article -
3
On the Automatic Analysis of the Practical Resistance of Obfusting Transformations
Published 2019-09-01Subjects: “…code obfuscation…”
Get full text
Article -
4
Enhancing resilience in IoT cybersecurity: the roles of obfuscation and diversification techniques for improving the multilayered cybersecurity of IoT systems
Published 2024-01-01Subjects: “…obfuscation…”
Get full text
Article -
5
Maintaining environmental context and geoprivacy protection in agriculture
Published 2025-06-01Subjects: Get full text
Article -
6
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
Published 2025-06-01Subjects: “…obfuscation techniques…”
Get full text
Article -
7
Philological obfuscation
Published 2009-06-01Subjects: “…philological obfuscation…”
Get full text
Article -
8
On Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations
Published 2021-03-01Subjects: “…obfuscation…”
Get full text
Article -
9
TOP: A Combined Logical and Physical Obfuscation Method for Securing Networks-on-Chip Against Reverse Engineering Attacks
Published 2025-01-01Subjects: Get full text
Article -
10
Software watermarking scheme with cloud computing constraints
Published 2016-09-01Subjects: “…non-equivalent semantic obfuscation…”
Get full text
Article -
11
Trusted execution environments for quantum computers
Published 2025-06-01Subjects: Get full text
Article -
12
A high performance approach to ensure image security during transmission
Published 2025-09-01Subjects: Get full text
Article -
13
Les conditions et limites d’un droit à l’altération des données personnelles par les personnes concernées
Published 2024-11-01Subjects: Get full text
Article -
14
Trajectory privacy protection method based on location obfuscation
Published 2018-07-01Subjects: Get full text
Article -
15
Fakeium: A dynamic execution environment for JavaScript program analysis
Published 2025-09-01Subjects: Get full text
Article -
16
Research on deception defense techniques based on network characteristics obfuscation
Published 2021-08-01Subjects: Get full text
Article -
17
On Simplifying Expressions with Mixed Boolean-Arithmetic
Published 2023-06-01Subjects: “…code obfuscation…”
Get full text
Article -
18
A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks
Published 2025-07-01Subjects: Get full text
Article -
19
Performance evaluations of AI-based obfuscated and encrypted malicious script detection with feature optimization
Published 2025-08-01Subjects: Get full text
Article -
20
Measurement of Anti-Debugging Techniques on the Windows and Linux Operating Systems for the Intel x86_64 Architecture
Published 2025-01-01Subjects: Get full text
Article