A neuro-fuzzy security risk assessment system for software development life cycle
This study aims to protect software development by creating a Software Risk Assessment
(SRA) model for each phase of the Software Development Life Cycle (SDLC) using an …
(SRA) model for each phase of the Software Development Life Cycle (SDLC) using an …
[HTML][HTML] Exploring Intellectual Property in the Digital Realm: A Bibliometric Study on Research on the Management and Protection of Data-Based Intellectual Property
H Sun, J Liu, B Chen, L Yang - Information, 2024 - mdpi.com
The management and protection of data-based intellectual property have attracted
increasing attention in the academic community due to the rapid development of digital …
increasing attention in the academic community due to the rapid development of digital …
A Framework to Quantify the Quality of Source Code Obfuscation
Malicious reverse engineering of software has served as a valuable technique for attackers
to infringe upon and steal intellectual property. We can employ obfuscation techniques to …
to infringe upon and steal intellectual property. We can employ obfuscation techniques to …
Research on the privacy protection model of government cyber security in smart cities based on big data
G Chen, H Wang - International Journal of Web …, 2023 - inderscienceonline.com
With the escalation of hacking methods, the existing network security privacy model can no
longer fully guarantee the security of private information. To solve the problem of poor …
longer fully guarantee the security of private information. To solve the problem of poor …
COOPS: A Code Obfuscation Method Based on Obscuring Program Semantics
Y Li, F Kang, H Shu, X Xiong, Z Sha… - Security and …, 2022 - Wiley Online Library
As reverse engineering technology develops rapidly, the financial loss caused by software
security issues is urgent. Therefore, how to effectively protect software is a critical problem to …
security issues is urgent. Therefore, how to effectively protect software is a critical problem to …
Code obfuscation protection strategies for program running states
X Song, H Wang, Y Wang, X Hei… - … on Networking and …, 2024 - ieeexplore.ieee.org
To enhance the security, complexity, and applicability of cloud node programs, effectively
hinder attackers from reverse engineering, and reduce the ability of detailed analysis and …
hinder attackers from reverse engineering, and reduce the ability of detailed analysis and …
Optimization of Smart Campus Cybersecurity and Student Privacy Protection Paths Based on Markov Models
D Jianhua - Applied Mathematics and Nonlinear Sciences, 2023 - sciendo.com
This paper starts with the application of hyper-convergence technology, builds the
framework of a university smart campus based on it, and gives the framework description of …
framework of a university smart campus based on it, and gives the framework description of …