Search Results - Programming code theft
-
1
Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review
ISSN: 2073-431X, 2073-431XPublished: Basel MDPI AG 01.04.2025Published in Computers (Basel) (01.04.2025)“…’ source code is crucial to prevent theft that could impact learning and future careers. Traditional storage solutions like Google Drive are vulnerable to hacking and alterations, highlighting the need for stronger protection…”
Get full text
Journal Article -
2
Source Code Author Attribution Using Author’s Programming Style and Code Smells
ISSN: 2074-904X, 2074-9058Published: Hong Kong Modern Education and Computer Science Press 01.05.2017Published in International journal of intelligent systems and applications (01.05.2017)“… Source code authorship attribution is vital for dealing with software theft, copyright issues and piracies…”
Get full text
Journal Article -
3
Heap Graph Based Software Theft Detection
ISSN: 1556-6013, 1556-6021Published: New York, NY IEEE 01.01.2013Published in IEEE transactions on information forensics and security (01.01.2013)“… In this paper, we use a relatively new technique, software birthmark, to help detect code theft of JavaScript programs…”
Get full text
Journal Article -
4
Android Mobile Malware Detection Using Machine Learning: A Systematic Review
ISSN: 2079-9292, 2079-9292Published: Basel MDPI AG 05.07.2021Published in Electronics (Basel) (05.07.2021)“…% of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and malicious advertising…”
Get full text
Journal Article -
5
Implementation of Cryptography Merkle-Hellman Knapsack Combination, Discrete Algorithm and ASCII Table Modification for PHP Source Code Security
ISSN: 1755-1307, 1755-1315Published: Bristol IOP Publishing 01.03.2021Published in IOP conference series. Earth and environmental science (01.03.2021)“… To distribute applications made using PHP must use the source code so that it is prone to theft of works…”
Get full text
Journal Article -
6
Learning to Find Usages of Library Functions in Optimized Binaries
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.10.2022Published in IEEE transactions on software engineering (01.10.2022)“…Much software, whether beneficent or malevolent, is distributed only as binaries, sans source code…”
Get full text
Journal Article -
7
Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer
ISSN: 1932-6203, 1932-6203Published: United States Public Library of Science 19.11.2021Published in PloS one (19.11.2021)“… Hackers often use confidential user data to exploit users for advertising, extortion, and theft…”
Get full text
Journal Article -
8
The Traveling Salesman Problem: A Computational Study
ISBN: 9780691129938, 0691129932, 1400841100, 9781400841103Published: Princeton Princeton University Press 2011“…This book presents the latest findings on one of the most intensely investigated subjects in computational mathematics--the traveling salesman problem. It…”
Get full text
eBook Book -
9
"OBTAINING" THE RIGHT RESULT: A NOVEL INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT THAT PROVIDES LIABILITY FOR INSIDER THEFT WITHOUT OVERBREADTH
ISSN: 0091-4169, 2160-0325Published: Chicago Northwestern University School of Law 22.06.2014Published in The journal of criminal law & criminology (22.06.2014)“… them. In 2009, Sergey Aleynikov was programming HFT code for Goldman and making $400,000 a year. This Comment argues that Aleynikov's theft should constitute a violation of federal law, but not the National Stolen Property Act or Economic Espionage Act…”
Get full text
Journal Article -
10
A survey of similarities in banking malware behaviours
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.08.2018Published in Computers & security (01.08.2018)“… Banking malware families have become persistent with new versions being released by the original authors or by others using leaked source code…”
Get full text
Journal Article -
11
IoT Detection based Energy Meter Integrated with Smart Devices
Published: IEEE 02.03.2023Published in 2023 Second International Conference on Electronics and Renewable Systems (ICEARS) (02.03.2023)“… A potent IoT prototyping platform is particle photon. The particle photon has many benefits, including remote programming, simple code transfer, and quick project turn…”
Get full text
Conference Proceeding -
12
Cyber acoustic analysis of additively manufactured objects
ISSN: 0268-3768, 1433-3015Published: London Springer London 01.04.2018Published in International journal of advanced manufacturing technology (01.04.2018)“… Acoustic and G-Code data was analyzed in a training phase and an attack phase. In the training phase, a supervised machine learning algorithm was trained using Python, which is an interpreted, object-oriented, high-level programming language…”
Get full text
Journal Article -
13
Software Birthmark Design and Estimation: A Systematic Literature Review
ISSN: 2193-567X, 1319-8025, 2191-4281Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2019Published in Arabian journal for science and engineering (2011) (01.04.2019)“… A number of birthmark designs have been proposed which are used to specify birthmark for source code and executable code related to particular programming languages…”
Get full text
Journal Article -
14
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.12.2017Published in IEEE transactions on software engineering (01.12.2017)“… For example, one application is to detect illegal code reuse. In the code theft cases, emerging obfuscation techniques have made automated detection increasingly difficult…”
Get full text
Journal Article -
15
The Semiotic Hitchhiker's Guide to Creaky Voice: Circulation and Gendered Hardcore in a Chicana/o Gang Persona
ISSN: 1055-1360, 1548-1395Published: Malden, USA Blackwell Publishing Inc 01.12.2011Published in Journal of linguistic anthropology (01.12.2011)“…This paper aims to build on some of Jane Hill's contributions to the understanding of indexicality and the creation of an intertextual media series (Hill…”
Get full text
Journal Article -
16
Understanding the Behavioral Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer Expertise
ISSN: 0167-4544, 1573-0697Published: Dordrecht Springer 01.10.2013Published in Journal of business ethics (01.10.2013)“… in the form of programming experience. We found that gender and computer expertise interact with Machiavellianism to influence individuals' intention of reporting unethical IT practices. This study helps us to improve our understanding of the emergent ethical issues existing in the IT-enabled decision environment…”
Get full text
Journal Article -
17
Cooperative Gaming: Diversity in the Games Industry and How to Cultivate Inclusion
ISBN: 0367342790, 9780367342807, 9780367342791, 0367342804Published: Boca Raton CRC Press 2021“…Cooperative Gaming provides context and practical advice regarding diversity in the games industry. The book begins with a deep dive into research literature…”
Get full text
eBook Book -
18
Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.05.2020Published in Computers & security (01.05.2020)“…) is efficient in detecting malware using sequences of API calls. However, an obfuscation technique could insert minimal data stealing code into a large set of legitimate instructions, which makes the detector ineffective…”
Get full text
Journal Article -
19
Black Boxes, White Noise: Similarity Detection for Neural Functions
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 20.02.2023Published in arXiv.org (20.02.2023)“…Similarity, or clone, detection has important applications in copyright violation, software theft, code search, and the detection of malicious components…”
Get full text
Paper -
20
Machine Learning Algorithms for Crime Prediction under Indian Penal Code
ISSN: 2198-5804, 2198-5812Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024Published in Annals of data science (01.02.2024)“…), simple linear regression (SLR), and support vector regression (SVR) after pre-processing the data using MySQL Workbench and R programming…”
Get full text
Journal Article

