Search Results - Programming code theft

Refine Results
  1. 1

    Employing Blockchain, NFTs, and Digital Certificates for Unparalleled Authenticity and Data Protection in Source Code: A Systematic Review by Ramirez Lopez, Leonardo Juan, Morillo Ledezma, Genesis Gabriela

    ISSN: 2073-431X, 2073-431X
    Published: Basel MDPI AG 01.04.2025
    Published in Computers (Basel) (01.04.2025)
    “…’ source code is crucial to prevent theft that could impact learning and future careers. Traditional storage solutions like Google Drive are vulnerable to hacking and alterations, highlighting the need for stronger protection…”
    Get full text
    Journal Article
  2. 2

    Source Code Author Attribution Using Author’s Programming Style and Code Smells by Gull, Muqaddas, Zia, Tehseen, Ilyas, Muhammad

    ISSN: 2074-904X, 2074-9058
    Published: Hong Kong Modern Education and Computer Science Press 01.05.2017
    “… Source code authorship attribution is vital for dealing with software theft, copyright issues and piracies…”
    Get full text
    Journal Article
  3. 3

    Heap Graph Based Software Theft Detection by Chan, P. P. F., Hui, L. C. K., Yiu, S. M.

    ISSN: 1556-6013, 1556-6021
    Published: New York, NY IEEE 01.01.2013
    “… In this paper, we use a relatively new technique, software birthmark, to help detect code theft of JavaScript programs…”
    Get full text
    Journal Article
  4. 4

    Android Mobile Malware Detection Using Machine Learning: A Systematic Review by Senanayake, Janaka, Kalutarage, Harsha, Al-Kadri, Mhd Omar

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 05.07.2021
    Published in Electronics (Basel) (05.07.2021)
    “…% of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and malicious advertising…”
    Get full text
    Journal Article
  5. 5

    Implementation of Cryptography Merkle-Hellman Knapsack Combination, Discrete Algorithm and ASCII Table Modification for PHP Source Code Security by Wadisman, C, Nozomi, I, Rahmawati, S

    ISSN: 1755-1307, 1755-1315
    Published: Bristol IOP Publishing 01.03.2021
    “… To distribute applications made using PHP must use the source code so that it is prone to theft of works…”
    Get full text
    Journal Article
  6. 6

    Learning to Find Usages of Library Functions in Optimized Binaries by Ahmed, Toufique, Devanbu, Premkumar, Sawant, Anand Ashok

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.10.2022
    Published in IEEE transactions on software engineering (01.10.2022)
    “…Much software, whether beneficent or malevolent, is distributed only as binaries, sans source code…”
    Get full text
    Journal Article
  7. 7

    Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer by Elkabbash, Emad T., Mostafa, Reham R., Barakat, Sherif I.

    ISSN: 1932-6203, 1932-6203
    Published: United States Public Library of Science 19.11.2021
    Published in PloS one (19.11.2021)
    “… Hackers often use confidential user data to exploit users for advertising, extortion, and theft…”
    Get full text
    Journal Article
  8. 8

    The Traveling Salesman Problem: A Computational Study by Applegate, David L, Bixby, Robert E, Chvátal, Vašek, Cook, William J

    ISBN: 9780691129938, 0691129932, 1400841100, 9781400841103
    Published: Princeton Princeton University Press 2011
    “…This book presents the latest findings on one of the most intensely investigated subjects in computational mathematics--the traveling salesman problem. It…”
    Get full text
    eBook Book
  9. 9

    "OBTAINING" THE RIGHT RESULT: A NOVEL INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT THAT PROVIDES LIABILITY FOR INSIDER THEFT WITHOUT OVERBREADTH by Jakopchek, Kevin

    ISSN: 0091-4169, 2160-0325
    Published: Chicago Northwestern University School of Law 22.06.2014
    Published in The journal of criminal law & criminology (22.06.2014)
    “… them. In 2009, Sergey Aleynikov was programming HFT code for Goldman and making $400,000 a year. This Comment argues that Aleynikov's theft should constitute a violation of federal law, but not the National Stolen Property Act or Economic Espionage Act…”
    Get full text
    Journal Article
  10. 10

    A survey of similarities in banking malware behaviours by Black, Paul, Gondal, Iqbal, Layton, Robert

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.08.2018
    Published in Computers & security (01.08.2018)
    “… Banking malware families have become persistent with new versions being released by the original authors or by others using leaked source code…”
    Get full text
    Journal Article
  11. 11

    IoT Detection based Energy Meter Integrated with Smart Devices by K, Vinoth Kumar, P, Aishwarya, A, Charishma, K, Gautammee K, Deepthi, Kesamreddy

    Published: IEEE 02.03.2023
    “… A potent IoT prototyping platform is particle photon. The particle photon has many benefits, including remote programming, simple code transfer, and quick project turn…”
    Get full text
    Conference Proceeding
  12. 12

    Cyber acoustic analysis of additively manufactured objects by Mativo, Thomas, Fritz, Colleen, Fidan, Ismail

    ISSN: 0268-3768, 1433-3015
    Published: London Springer London 01.04.2018
    “… Acoustic and G-Code data was analyzed in a training phase and an attack phase. In the training phase, a supervised machine learning algorithm was trained using Python, which is an interpreted, object-oriented, high-level programming language…”
    Get full text
    Journal Article
  13. 13

    Software Birthmark Design and Estimation: A Systematic Literature Review by Nazir, Shah, Shahzad, Sara, Mukhtar, Neelam

    ISSN: 2193-567X, 1319-8025, 2191-4281
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2019
    “… A number of birthmark designs have been proposed which are used to specify birthmark for source code and executable code related to particular programming languages…”
    Get full text
    Journal Article
  14. 14

    Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection by Luo, Lannan, Ming, Jiang, Wu, Dinghao, Liu, Peng, Zhu, Sencun

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.12.2017
    Published in IEEE transactions on software engineering (01.12.2017)
    “… For example, one application is to detect illegal code reuse. In the code theft cases, emerging obfuscation techniques have made automated detection increasingly difficult…”
    Get full text
    Journal Article
  15. 15

    The Semiotic Hitchhiker's Guide to Creaky Voice: Circulation and Gendered Hardcore in a Chicana/o Gang Persona by Mendoza-Denton, Norma

    ISSN: 1055-1360, 1548-1395
    Published: Malden, USA Blackwell Publishing Inc 01.12.2011
    Published in Journal of linguistic anthropology (01.12.2011)
    “…This paper aims to build on some of Jane Hill's contributions to the understanding of indexicality and the creation of an intertextual media series (Hill…”
    Get full text
    Journal Article
  16. 16

    Understanding the Behavioral Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer Expertise by Stylianou, Antonis C., Winter, Susan, Niu, Yuan, Giacalone, Robert A., Campbell, Matt

    ISSN: 0167-4544, 1573-0697
    Published: Dordrecht Springer 01.10.2013
    Published in Journal of business ethics (01.10.2013)
    “… in the form of programming experience. We found that gender and computer expertise interact with Machiavellianism to influence individuals' intention of reporting unethical IT practices. This study helps us to improve our understanding of the emergent ethical issues existing in the IT-enabled decision environment…”
    Get full text
    Journal Article
  17. 17

    Cooperative Gaming: Diversity in the Games Industry and How to Cultivate Inclusion by Cole, Alayna, Zammit, Jessica

    ISBN: 0367342790, 9780367342807, 9780367342791, 0367342804
    Published: Boca Raton CRC Press 2021
    “…Cooperative Gaming provides context and practical advice regarding diversity in the games industry. The book begins with a deep dive into research literature…”
    Get full text
    eBook Book
  18. 18

    Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences by Suaboot, Jakapan, Tari, Zahir, Mahmood, Abdun, Zomaya, Albert Y., Li, Wei

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.05.2020
    Published in Computers & security (01.05.2020)
    “…) is efficient in detecting malware using sequences of API calls. However, an obfuscation technique could insert minimal data stealing code into a large set of legitimate instructions, which makes the detector ineffective…”
    Get full text
    Journal Article
  19. 19

    Black Boxes, White Noise: Similarity Detection for Neural Functions by Farmahinifarahani, Farima, Lopes, Cristina V

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 20.02.2023
    Published in arXiv.org (20.02.2023)
    “…Similarity, or clone, detection has important applications in copyright violation, software theft, code search, and the detection of malicious components…”
    Get full text
    Paper
  20. 20

    Machine Learning Algorithms for Crime Prediction under Indian Penal Code by Aziz, Rabia Musheer, Sharma, Prajwal, Hussain, Aftab

    ISSN: 2198-5804, 2198-5812
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2024
    Published in Annals of data science (01.02.2024)
    “…), simple linear regression (SLR), and support vector regression (SVR) after pre-processing the data using MySQL Workbench and R programming…”
    Get full text
    Journal Article