A neuro-fuzzy security risk assessment system for software development life cycle

OO Olusanya, RG Jimoh, S Misra, JB Awotunde - Heliyon, 2024 - cell.com
This study aims to protect software development by creating a Software Risk Assessment
(SRA) model for each phase of the Software Development Life Cycle (SDLC) using an …

[HTML][HTML] Exploring Intellectual Property in the Digital Realm: A Bibliometric Study on Research on the Management and Protection of Data-Based Intellectual Property

H Sun, J Liu, B Chen, L Yang - Information, 2024 - mdpi.com
The management and protection of data-based intellectual property have attracted
increasing attention in the academic community due to the rapid development of digital …

A Framework to Quantify the Quality of Source Code Obfuscation

H Jin, J Lee, S Yang, K Kim, DH Lee - Applied Sciences, 2024 - mdpi.com
Malicious reverse engineering of software has served as a valuable technique for attackers
to infringe upon and steal intellectual property. We can employ obfuscation techniques to …

Research on the privacy protection model of government cyber security in smart cities based on big data

G Chen, H Wang - International Journal of Web …, 2023 - inderscienceonline.com
With the escalation of hacking methods, the existing network security privacy model can no
longer fully guarantee the security of private information. To solve the problem of poor …

COOPS: A Code Obfuscation Method Based on Obscuring Program Semantics

Y Li, F Kang, H Shu, X Xiong, Z Sha… - Security and …, 2022 - Wiley Online Library
As reverse engineering technology develops rapidly, the financial loss caused by software
security issues is urgent. Therefore, how to effectively protect software is a critical problem to …

Code obfuscation protection strategies for program running states

X Song, H Wang, Y Wang, X Hei… - … on Networking and …, 2024 - ieeexplore.ieee.org
To enhance the security, complexity, and applicability of cloud node programs, effectively
hinder attackers from reverse engineering, and reduce the ability of detailed analysis and …

Optimization of Smart Campus Cybersecurity and Student Privacy Protection Paths Based on Markov Models

D Jianhua - Applied Mathematics and Nonlinear Sciences, 2023 - sciendo.com
This paper starts with the application of hyper-convergence technology, builds the
framework of a university smart campus based on it, and gives the framework description of …