Search Results - python obfuscator*
-
1
Authors: Izosimov, Pavel
Subject Terms: Alpha Beta Network, code protection, cloud platform, secure code sharing, code security, python obfuscator, secure file transfer, code obfuscation, intellectual property protection, software licensing, secure distribution, python development, python code encryption, license management, python security, source code protection
-
2
Authors: et al.
Source: MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer. 22:519-528
-
3
Alternate Title: DEVELOPMENT AND APPLICATION OF AN OBFUSCATOR FOR CYBERSECURITY OF CRITICAL INFRASTRUCTURE OBJECTS. (English)
Authors: et al.
Source: Èlektronnoe Modelirovanie; 2025, Vol. 47 Issue 4, p49-56, 8p
-
4
Authors:
Source: Electronics (2079-9292); Jun2024, Vol. 13 Issue 12, p2272, 15p
Subject Terms: PROGRAMMING languages, COMPUTER science, RESEARCH personnel, ACADEMIC programs, SMARTPHONES, SALINE injections
-
5
Authors:
Source: urn:isbn:978-0-7695-4979-8 ; Proceedings of the 2013 IEEE 27th International Symposium on Parallel and Distributed Processing Workshops and PhD Forum, 435--444 (2013); 27th International Symposium on Parallel and Distributed Processing Workshops, 05-2013
Subject Terms: Evolutionary Algorithm, Multi Objective Evolutionary Algorithm, Software Obfuscation, Source-to-source Compilation, NSGA-II, PIPS, Python, Engineering, computing & technology, Computer science, Ingénierie, informatique & technologie, Sciences informatiques
Relation: http://dx.doi.org/10.1109/IPDPSW.2013.234; https://orbilu.uni.lu/handle/10993/10156; info:hdl:10993/10156
-
6
Authors: et al.
Source: Machine Learning & Knowledge Extraction; Dec2025, Vol. 7 Issue 4, p125, 29p
Subject Terms: MACHINE learning, STATISTICAL accuracy
-
7
Authors: et al.
Source: ACM Transactions on Privacy & Security; Sep2021, Vol. 24 Issue 4, p1-35, 35p
Subject Terms: FEATURE extraction, SOURCE code, PROGRAMMING languages, DEEP learning, RECURRENT neural networks
-
8
Authors: et al.
Source: Algorithms; Feb2025, Vol. 18 Issue 2, p54, 20p
-
9
Authors:
Source: Grenze International Journal of Engineering & Technology (GIJET); Jan2025, Vol. 11 Issue Part1, p645-653, 9p
Subject Terms: SPECKLE interference, LINGUISTIC context, TURING test, LINGUISTIC landscapes, GRAYSCALE model
-
10
Authors:
Resource Type: eBook.
-
11
Authors: et al.
Source: Empirical Software Engineering; Feb2026, Vol. 31 Issue 1, p1-38, 38p
-
12
Authors:
Source: International Journal of Intelligent Engineering & Systems; 2026, Vol. 19 Issue 1, p114-127, 14p
-
13
Authors: Mark Lutz
Resource Type: eBook.
Subjects: Python (Computer program language)
Categories: COMPUTERS / Languages / Python, COMPUTERS / Programming / General, COMPUTERS / Programming / Object Oriented, COMPUTERS / Programming / Open Source
-
14
Authors: et al.
Source: Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II; 2016, p521-550, 30p
-
15
Authors:
Source: Computers, Materials & Continua; 2026, Vol. 87 Issue 1, p1-69, 69p
-
16
Authors:
Source: Cyber Security & Applications; Dec2025, Vol. 3, p1-17, 17p
-
17
Authors: et al.
Source: PeerJ Computer Science; Dec2025, p1-24, 24p
Subject Terms: MALWARE, CLASSIFICATION, MACHINE learning, ARTIFICIAL neural networks, FALSE positive error
-
18
Authors: et al.
Source: ACM Transactions on Privacy & Security; Nov2025, Vol. 28 Issue 4, p1-23, 23p
-
19
Authors:
Source: Electronics (2079-9292); Oct2025, Vol. 14 Issue 19, p3915, 20p
Subject Terms: CONVOLUTIONAL neural networks, MALWARE, CLASSIFICATION, ARTIFICIAL neural networks
-
20
Authors:
Source: Journal of Multidisciplinary Healthcare; Oct2025, Vol. 18, p6479-6501, 23p
Nájsť tento článok vo Web of Science
Full Text Finder