The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for obfuscate with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2006 (17) 2007-2008 (17) 2009-2012 (15) 2013-2022 (15) 2023-2024 (3)
Publication types (Num. hits)
article(13) inproceedings(54)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 88 occurrences of 76 keywords

Results
Found 67 publication records. Showing 67 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
51Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF restructured arrays, source code obfuscation, reverse engineering
36Muhammad Raza Ali Why teach reverse engineering? Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF software evolution and maintenance, software reverse engineering, internet, software engineering, program understanding, reengineering, legacy systems, obfuscate, plagiarism
34Shenoda Guirguis, Alok Pareek BronzeGate: real-time transactional data obfuscation for GoldenGate. Search on Bibsonomy EDBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data obfuscation, real-time transactional data management, security, privacy, usability, masking
34Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew Control flow obfuscation with information flow tracking. Search on Bibsonomy MICRO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF control flow obfuscation, opaque predicate, information flow tracking, control speculation
34Xiangdong An 0001, Dawn N. Jutla, Nick Cercone Reasoning about obfuscated private information: who have lied and how to lie. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bayesian networks, privacy protection, inference control, ubiquitous environments
34Satoshi Hada Zero-Knowledge and Code Obfuscation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34Christian S. Collberg, Clark D. Thomborson, Douglas Low Breaking Abstractions and Unstructuring Data Structures. Search on Bibsonomy ICCL The full citation details ... 1998 DBLP  DOI  BibTeX  RDF obfuscation, intellectual property protection, code transformations
30Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
30Antigoni Polychroniadou, Gabriele Cipriani, Richard Hua, Tucker Balch Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy. Search on Bibsonomy AAMAS The full citation details ... 2024 DBLP  BibTeX  RDF
30Yanhui Chen, Yun Feng, Zhi Wang, Jianjun Zhao, Chengchun Wang, Qixu Liu IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning. Search on Bibsonomy ICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
30Ian McQuoid, Mike Rosulek, Jiayu Xu How to Obfuscate MPC Inputs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
30Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Ian McQuoid, Mike Rosulek, Jiayu Xu How to Obfuscate MPC Inputs. Search on Bibsonomy TCC (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Bijan Shahbaz Nejad, Peter Roch, Marcus Handte, Pedro José Marrón Enhancing Privacy in Computer Vision Applications: An Emotion Preserving Approach to Obfuscate Faces. Search on Bibsonomy ISVC (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le Enhancing the Insertion of NOP Instructions to Obfuscate Malware via Deep Reinforcement Learning. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
30David Eberius, David Böhme, Olga Pearce Did the GPU obfuscate the load imbalance in my MPI simulation? Search on Bibsonomy HiPar@SC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Raghavendra Pradyumna Pothukuchi, Sweta Yamini Pothukuchi, Petros G. Voulgaris, Alexander G. Schwing, Josep Torrellas Maya: Using Formal Control to Obfuscate Power Side Channels. Search on Bibsonomy ISCA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Marcin Kardas, Marek Klonowski, Piotr Syga How to obfuscate execution of protocols in an ad hoc radio network? Search on Bibsonomy Ad Hoc Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
30Jia-Ning Luo, Ming-Hour Yang, Kuo-Yu Tsai A geographic map-based middleware framework to obfuscate smart vehicles' locations. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
30Diego Esteves, Aniketh Janardhan Reddy, Piyush Chawla, Jens Lehmann 0001 Belittling the Source: Trustworthiness Indicators to Obfuscate Fake News on the Web. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
30Xiaopeng Yang, Stanko Dimitrov Data envelopment analysis may obfuscate corporate financial data: using support vector machine and data envelopment analysis to predict corporate failure for nonmanufacturing firms. Search on Bibsonomy INFOR Inf. Syst. Oper. Res. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Dale Schinstock, Shane Smith, Warren N. White Does inexpensive hardware obfuscate simple experiments for control systems laboratories? Search on Bibsonomy ACC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Joe Zimmerman How to Obfuscate Programs Directly. Search on Bibsonomy EUROCRYPT (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Joe Zimmerman How to Obfuscate Programs Directly. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
30Justin L. Rice, Vir V. Phoha, Philip Robinson Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez Online Randomization Strategies to Obfuscate User Behavioral Patterns. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Edward Ferguson, Joseph Weber, Ragib Hasan Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis. Search on Bibsonomy SERVICES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood Using Code Bloat to Obfuscate Evolved Network Traffic. Search on Bibsonomy EvoApplications (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
30William R. Cheswick Johnny Can Obfuscate: Beyond Mother's Maiden Name. Search on Bibsonomy HotSec The full citation details ... 2006 DBLP  BibTeX  RDF
30William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 Obfuscate arrays by homomorphic functions. Search on Bibsonomy GrC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Andrea Bianchi, Ian Oakley, Dong-Soo Kwon The secure haptic keypad: a tactile password system. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF pin entry, tactile ui, security, user study
17Karen Renaud, Joseph Maguire 0001 Armchair authentication. Search on Bibsonomy BCS HCI The full citation details ... 2009 DBLP  BibTeX  RDF graphical authentication mechanism, secluded space, context, shared space
17Ken Layng Non-technical keys to keeping your personally identifiable information PII risk mitigation project on track. Search on Bibsonomy SIGUCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PII, non-technical, management, efficiency, encryption, project, risks, strategy, sensitive, scanning, data, team, remediation, mitigate
17Shucai Xiao, Jung-Min Park 0001, Yanzhu Ye Tamper Resistance for Software Defined Radio Software. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Razvi Doomun, Thaier Hayajneh, Prashant Krishnamurthy, David Tipper SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Kevin J. Hoffman, Patrick Eugster, Suresh Jagannathan Semantics-aware trace analysis. Search on Bibsonomy PLDI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF semantic tracing, trace views, tracing, testing tools, automated debugging, debugging aids
17Stephen Drape, Irina Voiculescu Creating Transformations for Matrix Obfuscation. Search on Bibsonomy SAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Program Transformations, Information Hiding, Obfuscation, Matrix Operations
17Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker Performing traffic analysis on a wireless identifier-free link layer. Search on Bibsonomy Richard Tapia Celebration of Diversity in Computing Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee Automatic Reverse Engineering of Malware Emulators. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Christelle Braun, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi Compositional Methods for Information-Hiding. Search on Bibsonomy FoSSaCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Christian Kästner, Sven Apel, Martin Kuhlemann Granularity in software product lines. Search on Bibsonomy ICSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF feature refactoring, virtual separation of concerns, software product lines, ide
17ZhangBing Zhou, Sami Bhiri, Manfred Hauswirth Control and data dependencies in business processes based on semantic business activities. Search on Bibsonomy iiWAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web service based business process, semantics, data dependency, control dependency, sequencing constraint
17Diomidis Spinellis I Spy. Search on Bibsonomy IEEE Softw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF performance, measurement, analysis, tracing, instrumentation
17Romain Beauxis, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi, Prakash Panangaden Formal Approaches to Information-Hiding (Tutorial). Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Marcelo De Barros, Jing Shiau, Chen Shang, Kenton Gidewall, Hui Shi, Joe Forsmann Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington Program Fragmentation as a Metamorphic Software Protection. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga Categorization and Optimization of Synchronization Dependencies in Business Processes. Search on Bibsonomy ICDE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Ben Adida, Douglas Wikström How to Shuffle in Public. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Karl Gyllstrom, Dorian Miller, P. David Stotts Techniques for improving the visibility and "sharability" of semi-transparent video in shared workspaces. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semi-transparency, collaboration, videoconferencing
17Tao Jiang 0004, Helen J. Wang, Yih-Chun Hu Preserving location privacy in wireless lans. Search on Bibsonomy MobiSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, localization, 802.11
17Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan Graphical passwords & qualitative spatial relations. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17James A. Jones, Mary Jean Harrold, James F. Bowring Debugging in Parallel. Search on Bibsonomy ISSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF execution clustering, empirical study, program analysis, fault localization, automated debugging
17Pandurang Kamat, Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang Temporal Privacy in Wireless Sensor Networks. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Srikanth Palla, Ram Dantu Unwanted SMTP Paths and Relays. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Christophe Clavier Secret External Encodings Do Not Prevent Transient Fault Analysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Physical Attacks, Secret Algorithm, Cryptographic Design, External Encoding, Smart Cards, DES, Fault Analysis
17Marios Iliofotou, Prashanth Pappu, Michalis Faloutsos, Michael Mitzenmacher, Sumeet Singh, George Varghese Network monitoring using traffic dispersion graphs (tdgs). Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF behavioral approach, hosts' connection graphs, network traffic visualization, network monitoring
17Xiangdong An 0001, Dawn N. Jutla, Nick Cercone Temporal Context Lie Detection and Generation. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF pervasive computing, obfuscation, dynamic Bayesian networks, inference control, uncertain reasoning, Privacy management, context inference
17Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood On evolving buffer overflow attacks using genetic programming. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection systems, linear genetic programming, mimicry attacks
17Abdulrahman Alarifi, Wenliang Du Diversify sensor nodes to improve resilience against node compromise. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless sensor networks, reverse engineering, diversity, obfuscation
17Jürgen Nützel, Anja Beyer Towards Trust in Digital Rights Management Systems. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Shafi Goldwasser, Yael Tauman Kalai On the Impossibility of Obfuscation with Auxiliary Input. Search on Bibsonomy FOCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jurgen J. Vinju Type-Driven Automatic Quotation of Concrete Object Code in Meta Programs. Search on Bibsonomy RISE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia Analyzing Memory Accesses in Obfuscated x86 Executables. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Serge Demeyer Refactor Conditionals into Polymorphism: What's the Performance Cost of Introducing Virtual Calls?. Search on Bibsonomy ICSM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, computational complexity, mobile agents, static analysis, obfuscation
17André DeHon Very Large Scale Spatial Computing. Search on Bibsonomy UMC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Hans-Wolfgang Loidl, Philip W. Trinder Engineering Large Parallel Functional Programs. Search on Bibsonomy Implementation of Functional Languages The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #67 of 67 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license