Suchergebnisse - Programming code theft

  1. 1

    Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review von Ramirez Lopez, Leonardo Juan, Morillo Ledezma, Genesis Gabriela

    ISSN: 2073-431X, 2073-431X
    Veröffentlicht: Basel MDPI AG 01.04.2025
    Veröffentlicht in Computers (Basel) (01.04.2025)
    “… ’ source code is crucial to prevent theft that could impact learning and future careers. Traditional storage solutions like Google Drive are vulnerable to hacking and alterations, highlighting the need for stronger protection …”
    Volltext
    Journal Article
  2. 2

    The Traveling Salesman Problem: A Computational Study von Applegate, David L, Bixby, Robert E, Chvátal, Vašek, Cook, William J

    ISBN: 9780691129938, 0691129932, 1400841100, 9781400841103
    Veröffentlicht: Princeton Princeton University Press 2011
    “… This book presents the latest findings on one of the most intensely investigated subjects in computational mathematics--the traveling salesman problem. It …”
    Volltext
    E-Book Buch
  3. 3

    Source Code Author Attribution Using Author’s Programming Style and Code Smells von Gull, Muqaddas, Zia, Tehseen, Ilyas, Muhammad

    ISSN: 2074-904X, 2074-9058
    Veröffentlicht: Hong Kong Modern Education and Computer Science Press 01.05.2017
    “… Source code authorship attribution is vital for dealing with software theft, copyright issues and piracies …”
    Volltext
    Journal Article
  4. 4

    Heap Graph Based Software Theft Detection von Chan, P. P. F., Hui, L. C. K., Yiu, S. M.

    ISSN: 1556-6013, 1556-6021
    Veröffentlicht: New York, NY IEEE 01.01.2013
    “… In this paper, we use a relatively new technique, software birthmark, to help detect code theft of JavaScript programs …”
    Volltext
    Journal Article
  5. 5

    Android Mobile Malware Detection Using Machine Learning: A Systematic Review von Senanayake, Janaka, Kalutarage, Harsha, Al-Kadri, Mhd Omar

    ISSN: 2079-9292, 2079-9292
    Veröffentlicht: Basel MDPI AG 05.07.2021
    Veröffentlicht in Electronics (Basel) (05.07.2021)
    “… % of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and malicious advertising …”
    Volltext
    Journal Article
  6. 6

    Implementation of Cryptography Merkle-Hellman Knapsack Combination, Discrete Algorithm and ASCII Table Modification for PHP Source Code Security von Wadisman, C, Nozomi, I, Rahmawati, S

    ISSN: 1755-1307, 1755-1315
    Veröffentlicht: Bristol IOP Publishing 01.03.2021
    “… To distribute applications made using PHP must use the source code so that it is prone to theft of works …”
    Volltext
    Journal Article
  7. 7

    Learning to Find Usages of Library Functions in Optimized Binaries von Ahmed, Toufique, Devanbu, Premkumar, Sawant, Anand Ashok

    ISSN: 0098-5589, 1939-3520
    Veröffentlicht: New York IEEE 01.10.2022
    Veröffentlicht in IEEE transactions on software engineering (01.10.2022)
    “… Much software, whether beneficent or malevolent, is distributed only as binaries, sans source code …”
    Volltext
    Journal Article
  8. 8

    Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer von Elkabbash, Emad T., Mostafa, Reham R., Barakat, Sherif I.

    ISSN: 1932-6203, 1932-6203
    Veröffentlicht: United States Public Library of Science 19.11.2021
    Veröffentlicht in PloS one (19.11.2021)
    “… Hackers often use confidential user data to exploit users for advertising, extortion, and theft …”
    Volltext
    Journal Article
  9. 9

    "OBTAINING" THE RIGHT RESULT: A NOVEL INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT THAT PROVIDES LIABILITY FOR INSIDER THEFT WITHOUT OVERBREADTH von Jakopchek, Kevin

    ISSN: 0091-4169, 2160-0325
    Veröffentlicht: Chicago Northwestern University School of Law 22.06.2014
    Veröffentlicht in The journal of criminal law & criminology (22.06.2014)
    “… them. In 2009, Sergey Aleynikov was programming HFT code for Goldman and making $400,000 a year. This Comment argues that Aleynikov's theft should constitute a violation of federal law, but not the National Stolen Property Act or Economic Espionage Act …”
    Volltext
    Journal Article
  10. 10

    A survey of similarities in banking malware behaviours von Black, Paul, Gondal, Iqbal, Layton, Robert

    ISSN: 0167-4048, 1872-6208
    Veröffentlicht: Amsterdam Elsevier Ltd 01.08.2018
    Veröffentlicht in Computers & security (01.08.2018)
    “… Banking malware families have become persistent with new versions being released by the original authors or by others using leaked source code …”
    Volltext
    Journal Article
  11. 11

    IoT Detection based Energy Meter Integrated with Smart Devices von K, Vinoth Kumar, P, Aishwarya, A, Charishma, K, Gautammee K, Deepthi, Kesamreddy

    Veröffentlicht: IEEE 02.03.2023
    “… A potent IoT prototyping platform is particle photon. The particle photon has many benefits, including remote programming, simple code transfer, and quick project turn …”
    Volltext
    Tagungsbericht
  12. 12

    Cyber acoustic analysis of additively manufactured objects von Mativo, Thomas, Fritz, Colleen, Fidan, Ismail

    ISSN: 0268-3768, 1433-3015
    Veröffentlicht: London Springer London 01.04.2018
    “… Acoustic and G-Code data was analyzed in a training phase and an attack phase. In the training phase, a supervised machine learning algorithm was trained using Python, which is an interpreted, object-oriented, high-level programming language …”
    Volltext
    Journal Article
  13. 13

    Software Birthmark Design and Estimation: A Systematic Literature Review von Nazir, Shah, Shahzad, Sara, Mukhtar, Neelam

    ISSN: 2193-567X, 1319-8025, 2191-4281
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2019
    Veröffentlicht in Arabian journal for science and engineering (2011) (01.04.2019)
    “… A number of birthmark designs have been proposed which are used to specify birthmark for source code and executable code related to particular programming languages …”
    Volltext
    Journal Article
  14. 14

    Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection von Luo, Lannan, Ming, Jiang, Wu, Dinghao, Liu, Peng, Zhu, Sencun

    ISSN: 0098-5589, 1939-3520
    Veröffentlicht: New York IEEE 01.12.2017
    Veröffentlicht in IEEE transactions on software engineering (01.12.2017)
    “… For example, one application is to detect illegal code reuse. In the code theft cases, emerging obfuscation techniques have made automated detection increasingly difficult …”
    Volltext
    Journal Article
  15. 15

    The Semiotic Hitchhiker's Guide to Creaky Voice: Circulation and Gendered Hardcore in a Chicana/o Gang Persona von Mendoza-Denton, Norma

    ISSN: 1055-1360, 1548-1395
    Veröffentlicht: Malden, USA Blackwell Publishing Inc 01.12.2011
    Veröffentlicht in Journal of linguistic anthropology (01.12.2011)
    “… This paper aims to build on some of Jane Hill's contributions to the understanding of indexicality and the creation of an intertextual media series (Hill …”
    Volltext
    Journal Article
  16. 16

    Understanding the Behavioral Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer Expertise von Stylianou, Antonis C., Winter, Susan, Niu, Yuan, Giacalone, Robert A., Campbell, Matt

    ISSN: 0167-4544, 1573-0697
    Veröffentlicht: Dordrecht Springer 01.10.2013
    Veröffentlicht in Journal of business ethics (01.10.2013)
    “… in the form of programming experience. We found that gender and computer expertise interact with Machiavellianism to influence individuals' intention of reporting unethical IT practices. This study helps us to improve our understanding of the emergent ethical issues existing in the IT-enabled decision environment …”
    Volltext
    Journal Article
  17. 17

    Cooperative Gaming: Diversity in the Games Industry and How to Cultivate Inclusion von Cole, Alayna, Zammit, Jessica

    ISBN: 0367342790, 9780367342807, 9780367342791, 0367342804
    Veröffentlicht: Boca Raton CRC Press 2021
    “… Cooperative Gaming provides context and practical advice regarding diversity in the games industry. The book begins with a deep dive into research literature …”
    Volltext
    E-Book Buch
  18. 18

    Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences von Suaboot, Jakapan, Tari, Zahir, Mahmood, Abdun, Zomaya, Albert Y., Li, Wei

    ISSN: 0167-4048, 1872-6208
    Veröffentlicht: Amsterdam Elsevier Ltd 01.05.2020
    Veröffentlicht in Computers & security (01.05.2020)
    “… ) is efficient in detecting malware using sequences of API calls. However, an obfuscation technique could insert minimal data stealing code into a large set of legitimate instructions, which makes the detector ineffective …”
    Volltext
    Journal Article
  19. 19

    Black Boxes, White Noise: Similarity Detection for Neural Functions von Farmahinifarahani, Farima, Lopes, Cristina V

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 20.02.2023
    Veröffentlicht in arXiv.org (20.02.2023)
    “… Similarity, or clone, detection has important applications in copyright violation, software theft, code search, and the detection of malicious components …”
    Volltext
    Paper
  20. 20

    Machine Learning Algorithms for Crime Prediction under Indian Penal Code von Aziz, Rabia Musheer, Sharma, Prajwal, Hussain, Aftab

    ISSN: 2198-5804, 2198-5812
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024
    Veröffentlicht in Annals of data science (01.02.2024)
    “… ), simple linear regression (SLR), and support vector regression (SVR) after pre-processing the data using MySQL Workbench and R programming …”
    Volltext
    Journal Article