Search alternatives:
method » methods (Expand Search)
Showing 41 - 60 results of 5,785 for search 'executive method', query time: 0.12s Refine Results
  1. 41

    Method of diversity software protection based on fusion compilation by Xiaobing XIONG, Hui SHU, Fei KANG

    Published 2020-12-01
    “…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
    Get full text
    Article
  2. 42

    Universal patching method for side-channel vulnerabilities based on atomic obfuscation by Deqing ZOU, Pan ZHANG, Wei LIU, Weijie CHEN, Yifan LU

    Published 2022-04-01
    “…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
    Get full text
    Article
  3. 43

    Calculation Method for Critical Conditions of Distribution Network Considering Distributed Generation “Plug and Play” by Zhen JIANG, Li YU, Yanlu HUANG, Linhao YE, Shuang ZHENG, Guangfei GENG, Wei TANG

    Published 2020-04-01
    “…And based on the consideration of load and DG power fluctuation, a critical condition execution strategy is proposed. Furthermore, through theoretical analysis, the constraint conditions in the critical condition model are equivalently simplified, and a fast estimation method for solving the “plug and play” critical conditions of DG is obtained. …”
    Get full text
    Article
  4. 44
  5. 45

    Legal regime of records management in Russian executive authorities by Olga V. Marchenko

    Published 2020-10-01
    “…Problems of legislative regulation of information and records management in executive authorities activity are raised.The purpose of the article is confirmation or confutation of the hypothesis that the lack of centralization of legal regulation of records management in Russian executive authorities causes problems in public governance.The methodology includes formal-legal method, systematic approach, formal-logical method, analysis, synthesis. …”
    Get full text
    Article
  6. 46
  7. 47

    ACCOUNTING FRAUD AND CHARACTERISTICS OF COMPANY EXECUTIVES: AN EMPIRICAL INVESTIGATION by Maria BAXEVANI, George MYLONAS

    Published 2014-11-01
    “…This study examines accounting fraud in relation to the characteristics of company executives. The study portrays the degree to which company as well as personal motives could urge an executive to commit fraud. …”
    Get full text
    Article
  8. 48

    Adaptation of Executive Functions Rating Scale in Preschool Children by Hermahayu Hermahayu, Rayinda Faizah

    Published 2022-04-01
    “…This study aims to develop measurement instruments for executive functions (EF) in preschool children based on behavioral observation using a rating scale to identify the level of EF ability in children from an early age. …”
    Get full text
    Article
  9. 49

    CAN AUDIENCE REPLACE EXECUTION JUDGES IN MALE GYMNASTICS? by Ivan Čuk

    Published 2015-02-01
    “… The aim of research was to test the quality of spectator’s execution evaluation of gymnast’s performance compared to official judges. …”
    Get full text
    Article
  10. 50

    Fusion Execution of NaCl on Tree-Shaped MSA by S. V. Khobragade, S. L. Nalbalwar, A. B. Nandgaonkar

    Published 2018-01-01
    “…Fractal tree microstrip antenna utilizing NaCl execution strategy is exhibited in this paper. The fractal tree MSA provides scaling down and multiband operation. …”
    Get full text
    Article
  11. 51

    Impact of Asset Bubbles on Exercise of Executive Stock Options by Amin Mawani, Saikat Sarkar

    Published 2025-05-01
    “…This study examines whether Chief Executive Officers (CEOs) exercise a greater proportion of their exercisable options in response to firm-specific stock price bubbles. …”
    Get full text
    Article
  12. 52
  13. 53

    On the study of one way to detect anomalous program execution by Yury V. Kosolapov, Tatjyana A. Pavlova

    Published 2024-06-01
    “…Developing more accurate and adaptive methods for detecting malicious code is a critical challenge in the context of constantly evolving cybersecurity threats. …”
    Get full text
    Article
  14. 54

    Interrelationships Between Personality, Executive Function and Physical Activity by Chelsea Joyner, Paul D. Loprinzi

    Published 2017-08-01
    “…Background: The purpose of this study was to examine the interrelationships between personality, executive function (EF) and physical activity. Methods: Multivariable regression analyses examined the association between personality, executive function, and physical activity. …”
    Get full text
    Article
  15. 55

    TREASURY EXECUTION OF LOCAL SPENDING BUDGETS: PROBLEMS AND SOLUTIONS by D. I. Dema, N. N. Feshchenko

    Published 2017-10-01
    “…Current problems of treasury-based execution of local spending budgets are investigated and main deregulating factors affecting the procedure of cash execution of budgets are arranged in a system.Ways to improve budget funds management at the local level are proposed including: improvement of regulatory and software support of the budget process participants; improvement of a system of information exchange between Federal Treasury authorities, budget holders and operational financial bodies; replacement and retrofitting of outdated operating systems and the technological structure of information-analytical support of the Ukrainian State Communications Committee bodies; enhancement and extension of methods for controlling budget revenues and expenditures of budget holders and recipients; improvement of the practice of keeping account of local budget operations on budget resources.…”
    Get full text
    Article
  16. 56
  17. 57

    The integral visit to the family. Methodological guide for its execution by Anabel Geroy Fernández, Ana Teresa Fernández Vidal, Anais de la Caridad Núñez Herrera, Tania López Otero

    Published 2019-11-01
    “…<p><strong>Foundation:</strong> the comprehensive visit to the family contributes achieving the actions and the specific functions declared in the Program of the Family Doctor and Nurse in Cuba. It must be executed by basic health teams in each of the doctor's offices. …”
    Get full text
    Article
  18. 58

    Short playful interactions improve executive functions in children by Daniela Yaffe, Limor Shtoots, Omer Kochav Isakow, Yuval Daniel, Omer Reuveni, Shoshi Keisari, Yulia Golland

    Published 2025-07-01
    “…Abstract Executive Functions (EFs) are foundational for lifelong flourishing, supporting critical capacities such as planning, decision-making, and self-regulation. …”
    Get full text
    Article
  19. 59
  20. 60