EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: person:"Bhaskari, D. Lalitha"
Narrow search

Narrow search

Year of publication
Subject
All
Classification 1 Code Obfuscation Techniques 1 Code Transformation 1 Detection 1 Dynamic Code Obfuscation 1 Malware Analysis 1 Obfuscation and Packing Techniques 1 Self-Modifying Code 1
more ... less ...
Online availability
All
Undetermined 2
Type of publication
All
Article 2
Language
All
English 2
Author
All
Behera, Chandan Kumar 2 Bhaskari, D. Lalitha 2
Published in...
All
International Journal of Information Security and Privacy (IJISP) 1 International Journal of Secure Software Engineering (IJSSE) 1
Source
All
Other ZBW resources 2
Showing 1 - 2 of 2
Cover Image
Malware Methodologies and Its Future: A Survey
Behera, Chandan Kumar; Bhaskari, D. Lalitha - In: International Journal of Information Security and … 11 (2017) 4, pp. 47-64
Malware means any unwanted software that performs harmful actions or executes some tasks unauthorized. This includes all harmful programs like virus, worms, Trojan, rootkits, Botnets etc. The numbers of malwares rise exponentially with the increase of the use of digital media. With the enormous...
Persistent link: https://www.econbiz.de/10012045703
Saved in:
Cover Image
Self-Modifying Code: A Provable Technique for Enhancing Program Obfuscation
Behera, Chandan Kumar; Bhaskari, D. Lalitha - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 3, pp. 24-41
This article describes how code obfuscation techniques aim to conceal the functionality of a program by mystifying the code so that it is unreadable or in an incomprehensible format. Since the objective of this article is to make a program obfuscated, the source code shall appear like normal...
Persistent link: https://www.econbiz.de/10012048087
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...