Suchergebnisse - Programming code theft
-
1
Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review
ISSN: 2073-431X, 2073-431XVeröffentlicht: Basel MDPI AG 01.04.2025Veröffentlicht in Computers (Basel) (01.04.2025)“… ’ source code is crucial to prevent theft that could impact learning and future careers. Traditional storage solutions like Google Drive are vulnerable to hacking and alterations, highlighting the need for stronger protection …”
Volltext
Journal Article -
2
The Traveling Salesman Problem: A Computational Study
ISBN: 9780691129938, 0691129932, 1400841100, 9781400841103Veröffentlicht: Princeton Princeton University Press 2011“… This book presents the latest findings on one of the most intensely investigated subjects in computational mathematics--the traveling salesman problem. It …”
Volltext
E-Book Buch -
3
Source Code Author Attribution Using Author’s Programming Style and Code Smells
ISSN: 2074-904X, 2074-9058Veröffentlicht: Hong Kong Modern Education and Computer Science Press 01.05.2017Veröffentlicht in International journal of intelligent systems and applications (01.05.2017)“… Source code authorship attribution is vital for dealing with software theft, copyright issues and piracies …”
Volltext
Journal Article -
4
Heap Graph Based Software Theft Detection
ISSN: 1556-6013, 1556-6021Veröffentlicht: New York, NY IEEE 01.01.2013Veröffentlicht in IEEE transactions on information forensics and security (01.01.2013)“… In this paper, we use a relatively new technique, software birthmark, to help detect code theft of JavaScript programs …”
Volltext
Journal Article -
5
Android Mobile Malware Detection Using Machine Learning: A Systematic Review
ISSN: 2079-9292, 2079-9292Veröffentlicht: Basel MDPI AG 05.07.2021Veröffentlicht in Electronics (Basel) (05.07.2021)“… % of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and malicious advertising …”
Volltext
Journal Article -
6
Implementation of Cryptography Merkle-Hellman Knapsack Combination, Discrete Algorithm and ASCII Table Modification for PHP Source Code Security
ISSN: 1755-1307, 1755-1315Veröffentlicht: Bristol IOP Publishing 01.03.2021Veröffentlicht in IOP conference series. Earth and environmental science (01.03.2021)“… To distribute applications made using PHP must use the source code so that it is prone to theft of works …”
Volltext
Journal Article -
7
Learning to Find Usages of Library Functions in Optimized Binaries
ISSN: 0098-5589, 1939-3520Veröffentlicht: New York IEEE 01.10.2022Veröffentlicht in IEEE transactions on software engineering (01.10.2022)“… Much software, whether beneficent or malevolent, is distributed only as binaries, sans source code …”
Volltext
Journal Article -
8
Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer
ISSN: 1932-6203, 1932-6203Veröffentlicht: United States Public Library of Science 19.11.2021Veröffentlicht in PloS one (19.11.2021)“… Hackers often use confidential user data to exploit users for advertising, extortion, and theft …”
Volltext
Journal Article -
9
"OBTAINING" THE RIGHT RESULT: A NOVEL INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT THAT PROVIDES LIABILITY FOR INSIDER THEFT WITHOUT OVERBREADTH
ISSN: 0091-4169, 2160-0325Veröffentlicht: Chicago Northwestern University School of Law 22.06.2014Veröffentlicht in The journal of criminal law & criminology (22.06.2014)“… them. In 2009, Sergey Aleynikov was programming HFT code for Goldman and making $400,000 a year. This Comment argues that Aleynikov's theft should constitute a violation of federal law, but not the National Stolen Property Act or Economic Espionage Act …”
Volltext
Journal Article -
10
A survey of similarities in banking malware behaviours
ISSN: 0167-4048, 1872-6208Veröffentlicht: Amsterdam Elsevier Ltd 01.08.2018Veröffentlicht in Computers & security (01.08.2018)“… Banking malware families have become persistent with new versions being released by the original authors or by others using leaked source code …”
Volltext
Journal Article -
11
IoT Detection based Energy Meter Integrated with Smart Devices
Veröffentlicht: IEEE 02.03.2023Veröffentlicht in 2023 Second International Conference on Electronics and Renewable Systems (ICEARS) (02.03.2023)“… A potent IoT prototyping platform is particle photon. The particle photon has many benefits, including remote programming, simple code transfer, and quick project turn …”
Volltext
Tagungsbericht -
12
Cyber acoustic analysis of additively manufactured objects
ISSN: 0268-3768, 1433-3015Veröffentlicht: London Springer London 01.04.2018Veröffentlicht in International journal of advanced manufacturing technology (01.04.2018)“… Acoustic and G-Code data was analyzed in a training phase and an attack phase. In the training phase, a supervised machine learning algorithm was trained using Python, which is an interpreted, object-oriented, high-level programming language …”
Volltext
Journal Article -
13
Software Birthmark Design and Estimation: A Systematic Literature Review
ISSN: 2193-567X, 1319-8025, 2191-4281Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2019Veröffentlicht in Arabian journal for science and engineering (2011) (01.04.2019)“… A number of birthmark designs have been proposed which are used to specify birthmark for source code and executable code related to particular programming languages …”
Volltext
Journal Article -
14
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection
ISSN: 0098-5589, 1939-3520Veröffentlicht: New York IEEE 01.12.2017Veröffentlicht in IEEE transactions on software engineering (01.12.2017)“… For example, one application is to detect illegal code reuse. In the code theft cases, emerging obfuscation techniques have made automated detection increasingly difficult …”
Volltext
Journal Article -
15
The Semiotic Hitchhiker's Guide to Creaky Voice: Circulation and Gendered Hardcore in a Chicana/o Gang Persona
ISSN: 1055-1360, 1548-1395Veröffentlicht: Malden, USA Blackwell Publishing Inc 01.12.2011Veröffentlicht in Journal of linguistic anthropology (01.12.2011)“… This paper aims to build on some of Jane Hill's contributions to the understanding of indexicality and the creation of an intertextual media series (Hill …”
Volltext
Journal Article -
16
Understanding the Behavioral Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer Expertise
ISSN: 0167-4544, 1573-0697Veröffentlicht: Dordrecht Springer 01.10.2013Veröffentlicht in Journal of business ethics (01.10.2013)“… in the form of programming experience. We found that gender and computer expertise interact with Machiavellianism to influence individuals' intention of reporting unethical IT practices. This study helps us to improve our understanding of the emergent ethical issues existing in the IT-enabled decision environment …”
Volltext
Journal Article -
17
Cooperative Gaming: Diversity in the Games Industry and How to Cultivate Inclusion
ISBN: 0367342790, 9780367342807, 9780367342791, 0367342804Veröffentlicht: Boca Raton CRC Press 2021“… Cooperative Gaming provides context and practical advice regarding diversity in the games industry. The book begins with a deep dive into research literature …”
Volltext
E-Book Buch -
18
Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences
ISSN: 0167-4048, 1872-6208Veröffentlicht: Amsterdam Elsevier Ltd 01.05.2020Veröffentlicht in Computers & security (01.05.2020)“… ) is efficient in detecting malware using sequences of API calls. However, an obfuscation technique could insert minimal data stealing code into a large set of legitimate instructions, which makes the detector ineffective …”
Volltext
Journal Article -
19
Black Boxes, White Noise: Similarity Detection for Neural Functions
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 20.02.2023Veröffentlicht in arXiv.org (20.02.2023)“… Similarity, or clone, detection has important applications in copyright violation, software theft, code search, and the detection of malicious components …”
Volltext
Paper -
20
Machine Learning Algorithms for Crime Prediction under Indian Penal Code
ISSN: 2198-5804, 2198-5812Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024Veröffentlicht in Annals of data science (01.02.2024)“… ), simple linear regression (SLR), and support vector regression (SVR) after pre-processing the data using MySQL Workbench and R programming …”
Volltext
Journal Article

