Výsledky vyhledávání - Programming code theft

  1. 1

    Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review Autor Ramirez Lopez, Leonardo Juan, Morillo Ledezma, Genesis Gabriela

    ISSN: 2073-431X, 2073-431X
    Vydáno: Basel MDPI AG 01.04.2025
    Vydáno v Computers (Basel) (01.04.2025)
    “…’ source code is crucial to prevent theft that could impact learning and future careers. Traditional storage solutions like Google Drive are vulnerable to hacking and alterations, highlighting the need for stronger protection…”
    Získat plný text
    Journal Article
  2. 2

    The Traveling Salesman Problem: A Computational Study Autor Applegate, David L, Bixby, Robert E, Chvátal, Vašek, Cook, William J

    ISBN: 9780691129938, 0691129932, 1400841100, 9781400841103
    Vydáno: Princeton Princeton University Press 2011
    “…This book presents the latest findings on one of the most intensely investigated subjects in computational mathematics--the traveling salesman problem. It…”
    Získat plný text
    E-kniha Kniha
  3. 3

    Source Code Author Attribution Using Author’s Programming Style and Code Smells Autor Gull, Muqaddas, Zia, Tehseen, Ilyas, Muhammad

    ISSN: 2074-904X, 2074-9058
    Vydáno: Hong Kong Modern Education and Computer Science Press 01.05.2017
    “… Source code authorship attribution is vital for dealing with software theft, copyright issues and piracies…”
    Získat plný text
    Journal Article
  4. 4

    Heap Graph Based Software Theft Detection Autor Chan, P. P. F., Hui, L. C. K., Yiu, S. M.

    ISSN: 1556-6013, 1556-6021
    Vydáno: New York, NY IEEE 01.01.2013
    “… In this paper, we use a relatively new technique, software birthmark, to help detect code theft of JavaScript programs…”
    Získat plný text
    Journal Article
  5. 5

    Android Mobile Malware Detection Using Machine Learning: A Systematic Review Autor Senanayake, Janaka, Kalutarage, Harsha, Al-Kadri, Mhd Omar

    ISSN: 2079-9292, 2079-9292
    Vydáno: Basel MDPI AG 05.07.2021
    Vydáno v Electronics (Basel) (05.07.2021)
    “…% of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and malicious advertising…”
    Získat plný text
    Journal Article
  6. 6

    Implementation of Cryptography Merkle-Hellman Knapsack Combination, Discrete Algorithm and ASCII Table Modification for PHP Source Code Security Autor Wadisman, C, Nozomi, I, Rahmawati, S

    ISSN: 1755-1307, 1755-1315
    Vydáno: Bristol IOP Publishing 01.03.2021
    “… To distribute applications made using PHP must use the source code so that it is prone to theft of works…”
    Získat plný text
    Journal Article
  7. 7

    Learning to Find Usages of Library Functions in Optimized Binaries Autor Ahmed, Toufique, Devanbu, Premkumar, Sawant, Anand Ashok

    ISSN: 0098-5589, 1939-3520
    Vydáno: New York IEEE 01.10.2022
    “…Much software, whether beneficent or malevolent, is distributed only as binaries, sans source code…”
    Získat plný text
    Journal Article
  8. 8

    Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer Autor Elkabbash, Emad T., Mostafa, Reham R., Barakat, Sherif I.

    ISSN: 1932-6203, 1932-6203
    Vydáno: United States Public Library of Science 19.11.2021
    Vydáno v PloS one (19.11.2021)
    “… Hackers often use confidential user data to exploit users for advertising, extortion, and theft…”
    Získat plný text
    Journal Article
  9. 9

    "OBTAINING" THE RIGHT RESULT: A NOVEL INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT THAT PROVIDES LIABILITY FOR INSIDER THEFT WITHOUT OVERBREADTH Autor Jakopchek, Kevin

    ISSN: 0091-4169, 2160-0325
    Vydáno: Chicago Northwestern University School of Law 22.06.2014
    “… them. In 2009, Sergey Aleynikov was programming HFT code for Goldman and making $400,000 a year. This Comment argues that Aleynikov's theft should constitute a violation of federal law, but not the National Stolen Property Act or Economic Espionage Act…”
    Získat plný text
    Journal Article
  10. 10

    A survey of similarities in banking malware behaviours Autor Black, Paul, Gondal, Iqbal, Layton, Robert

    ISSN: 0167-4048, 1872-6208
    Vydáno: Amsterdam Elsevier Ltd 01.08.2018
    Vydáno v Computers & security (01.08.2018)
    “… Banking malware families have become persistent with new versions being released by the original authors or by others using leaked source code…”
    Získat plný text
    Journal Article
  11. 11

    IoT Detection based Energy Meter Integrated with Smart Devices Autor K, Vinoth Kumar, P, Aishwarya, A, Charishma, K, Gautammee K, Deepthi, Kesamreddy

    Vydáno: IEEE 02.03.2023
    “… A potent IoT prototyping platform is particle photon. The particle photon has many benefits, including remote programming, simple code transfer, and quick project turn…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    Cyber acoustic analysis of additively manufactured objects Autor Mativo, Thomas, Fritz, Colleen, Fidan, Ismail

    ISSN: 0268-3768, 1433-3015
    Vydáno: London Springer London 01.04.2018
    “… Acoustic and G-Code data was analyzed in a training phase and an attack phase. In the training phase, a supervised machine learning algorithm was trained using Python, which is an interpreted, object-oriented, high-level programming language…”
    Získat plný text
    Journal Article
  13. 13

    Software Birthmark Design and Estimation: A Systematic Literature Review Autor Nazir, Shah, Shahzad, Sara, Mukhtar, Neelam

    ISSN: 2193-567X, 1319-8025, 2191-4281
    Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2019
    “… A number of birthmark designs have been proposed which are used to specify birthmark for source code and executable code related to particular programming languages…”
    Získat plný text
    Journal Article
  14. 14

    Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection Autor Luo, Lannan, Ming, Jiang, Wu, Dinghao, Liu, Peng, Zhu, Sencun

    ISSN: 0098-5589, 1939-3520
    Vydáno: New York IEEE 01.12.2017
    “… For example, one application is to detect illegal code reuse. In the code theft cases, emerging obfuscation techniques have made automated detection increasingly difficult…”
    Získat plný text
    Journal Article
  15. 15

    The Semiotic Hitchhiker's Guide to Creaky Voice: Circulation and Gendered Hardcore in a Chicana/o Gang Persona Autor Mendoza-Denton, Norma

    ISSN: 1055-1360, 1548-1395
    Vydáno: Malden, USA Blackwell Publishing Inc 01.12.2011
    Vydáno v Journal of linguistic anthropology (01.12.2011)
    “…This paper aims to build on some of Jane Hill's contributions to the understanding of indexicality and the creation of an intertextual media series (Hill…”
    Získat plný text
    Journal Article
  16. 16

    Understanding the Behavioral Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer Expertise Autor Stylianou, Antonis C., Winter, Susan, Niu, Yuan, Giacalone, Robert A., Campbell, Matt

    ISSN: 0167-4544, 1573-0697
    Vydáno: Dordrecht Springer 01.10.2013
    Vydáno v Journal of business ethics (01.10.2013)
    “… in the form of programming experience. We found that gender and computer expertise interact with Machiavellianism to influence individuals' intention of reporting unethical IT practices. This study helps us to improve our understanding of the emergent ethical issues existing in the IT-enabled decision environment…”
    Získat plný text
    Journal Article
  17. 17

    Cooperative Gaming: Diversity in the Games Industry and How to Cultivate Inclusion Autor Cole, Alayna, Zammit, Jessica

    ISBN: 0367342790, 9780367342807, 9780367342791, 0367342804
    Vydáno: Boca Raton CRC Press 2021
    “…Cooperative Gaming provides context and practical advice regarding diversity in the games industry. The book begins with a deep dive into research literature…”
    Získat plný text
    E-kniha Kniha
  18. 18

    Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences Autor Suaboot, Jakapan, Tari, Zahir, Mahmood, Abdun, Zomaya, Albert Y., Li, Wei

    ISSN: 0167-4048, 1872-6208
    Vydáno: Amsterdam Elsevier Ltd 01.05.2020
    Vydáno v Computers & security (01.05.2020)
    “…) is efficient in detecting malware using sequences of API calls. However, an obfuscation technique could insert minimal data stealing code into a large set of legitimate instructions, which makes the detector ineffective…”
    Získat plný text
    Journal Article
  19. 19

    Black Boxes, White Noise: Similarity Detection for Neural Functions Autor Farmahinifarahani, Farima, Lopes, Cristina V

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 20.02.2023
    Vydáno v arXiv.org (20.02.2023)
    “…Similarity, or clone, detection has important applications in copyright violation, software theft, code search, and the detection of malicious components…”
    Získat plný text
    Paper
  20. 20

    Machine Learning Algorithms for Crime Prediction under Indian Penal Code Autor Aziz, Rabia Musheer, Sharma, Prajwal, Hussain, Aftab

    ISSN: 2198-5804, 2198-5812
    Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024
    Vydáno v Annals of data science (01.02.2024)
    “…), simple linear regression (SLR), and support vector regression (SVR) after pre-processing the data using MySQL Workbench and R programming…”
    Získat plný text
    Journal Article