-
1601
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01“…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
Get full text
Article -
1602
Creep Properties of Axially Compressed Fly Ash Concrete under Sulfate Corrosion
Published 2022-01-01“…However, the concrete creep under both sustained compression load and sulfate attack conditions has rarely been reported. To obtain the creep characteristics of fly ash concrete in a sulfate environment, this paper first finishes the creep experiments of fly ash concrete under sustained compression load and sulfate attack. …”
Get full text
Article -
1603
Stochastic Dynamic Model of Sulfate Corrosion Reactions in Concrete Materials considering the Effects of Colored Gaussian Noises
Published 2019-01-01“…The corrosion reactions in concrete materials subjected to external environment attack can lead to the deterioration of concrete. …”
Get full text
Article -
1604
A Survey on Frameworks Used for Robustness Analysis on Interdependent Networks
Published 2020-01-01“…The analysis of network robustness tackles the problem of studying how a complex network behaves under adverse scenarios, such as failures or attacks. In particular, the analysis of interdependent networks’ robustness focuses on the specific case of the robustness of interacting networks and their emerging behaviors. …”
Get full text
Article -
1605
Insect Pest occurrence on Cultivated Amaranthus Spp in Benin City, Edo State, Nigeria
Published 2015-07-01“…Unfortunately, one of the major factors limiting the productivity of Amaranthus is the incidence of insect pests attack. The aim of this study was to determine the insect pest occurrence on cultivated Amaranths in Benin City, Nigeria. …”
Get full text
Article -
1606
New-Onset Panic, Depression with Suicidal Thoughts, and Somatic Symptoms in a Patient with a History of Lyme Disease
Published 2015-01-01“…We present a case of a 37-year-old man with no known psychiatric history who developed panic attacks, severe depressive symptoms and suicidal ideation, and neuromuscular complaints including back spasms, joint pain, myalgias, and neuropathic pain. …”
Get full text
Article -
1607
Vulnerability Evaluation and Improvement Method of Civil Aviation Navigation Network
Published 2022-01-01“…Vulnerability evaluation shows that the navigation network is more vulnerable when subject to the intentional attack of nodes with higher comprehensive node importance than an intentional attack of nodes with a larger value of indicators used in previous literature. …”
Get full text
Article -
1608
A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments
Published 2015-01-01“…Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling’s T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. …”
Get full text
Article -
1609
Dorsal hippocampus represents locations to avoid as well as locations to approach during approach-avoidance conflict.
Published 2025-01-01“…We found decoding of the pseudo-predator's location during HSEs when hesitating in the nest and during theta prior to retreating as the rats approached the pseudo-predator. After the first attack, we observed new place fields appearing at the location of the robot (not the location the rat was when attacked). …”
Get full text
Article -
1610
Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks
Published 2017-06-01“…How to protect sensors from attacks of malicious mobile agents becomes an important issue in the field. …”
Get full text
Article -
1611
Evaluating the Impact of Face Anonymization Methods on Computer Vision Tasks: A Trade-Off Between Privacy and Utility
Published 2025-01-01“…Furthermore, a re-identification attack scenario is applied. The study findings indicate a clear trade-off between increased privacy and decreased CV performance. …”
Get full text
Article -
1612
Hidden route of protein damage through oxygen-confined photooxidation
Published 2024-12-01“…The generated ROS then attack the protein interior through constrained diffusion, causing protein damage. …”
Get full text
Article -
1613
Robust medical zero‐watermarking algorithm based on Residual‐DenseNet
Published 2022-11-01“…Abstract To solve the problem of poor robustness of existing traditional DCT‐based medical image watermarking algorithms under geometric attacks, a novel deep learning‐based robust zero‐watermarking algorithm for medical images is proposed. …”
Get full text
Article -
1614
Terrorist Group Behavior Prediction by Wavelet Transform-Based Pattern Recognition
Published 2018-01-01“…Predicting terrorist attacks by group networks is an important but difficult issue in intelligence and security informatics. …”
Get full text
Article -
1615
Resilient robust model predictive load frequency control for smart grids with air conditioning loads
Published 2024-10-01“…The results also show that the proposed model predictive control strategy has some resistance to cyber attacks and external disturbances.…”
Get full text
Article -
1616
The big challenge for livestock genomics is to make sequence data pay
Published 2023-08-01“…It discusses potential explanations for why it is so difficult to consistently improve the accuracy of genomic prediction by means of whole-genome sequence data, and three potential attacks on the problem. …”
Get full text
Article -
1617
Integrated Strategies for Controlling Flower Thrips in Southern Highbush Blueberries
Published 2019-05-01“…Flower thrips are among the most important insect pests that attack early-season blueberries. This document is IPM-140, one of a series of the Entomology and Nematology Department, UF/IFAS Extension. …”
Get full text
Article -
1618
Integrated Strategies for Controlling Flower Thrips in Southern Highbush Blueberries
Published 2019-05-01“…Flower thrips are among the most important insect pests that attack early-season blueberries. This document is IPM-140, one of a series of the Entomology and Nematology Department, UF/IFAS Extension. …”
Get full text
Article -
1619
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach
Published 2025-01-01“…While flow records provide valuable information for detecting network-level anomalies and attacks, they do not consider packet-level information and payload content. …”
Get full text
Article -
1620
Short-term outcome of endovascular stenting for symptomatic vertebrobasilar stenosis
Published 2025-01-01“…Vertebrobasilar stenosis (VBS) is the main concern, causing stroke or ischemic attacks. Treatment includes antithrombotic therapy and lifestyle modifications, but invasive intervention like endovascular angioplasty is needed in indicated patients. …”
Get full text
Article