Zobrazeno 1 - 10
of 65
pro vyhledávání: '"William Mahoney"'
Autor:
Frank Koziarz, Caroline Roncadin, Anna Kata, Eric Duku, Amber Cauwenbergs, William Mahoney, Briano Di Rezze, Colleen Anderson, Irene Drmic, Judy Eerkes, Kathleen Dekker, Katholiki Georgiades, Lorraine Hoult, Olaf Kraus de Camargo, Olivia Ng, Peter Rosenbaum, Ronit Mesterman, Stephen J. Gentles, Sue Robertson, Teresa Bennett, Stelios Georgiades
Publikováno v:
Frontiers in Rehabilitation Sciences, Vol 2 (2021)
Objective: The day-to-day experience of families with an Autistic child may be shaped by both, child characteristics and available resources, which often are influenced by the socioeconomic context of the family. Using a socioecological approach, thi
Externí odkaz:
https://doaj.org/article/1b5da0bc661d4ce49039a10dd8b793be
Publikováno v:
International Conference on Cyber Warfare and Security. 18:246-255
This paper presents the results of a new method for interleaving CPU instructions in x86-64 machine code, such that one can hide executable code within other valid instructions. The aim is to make it more difficult to reverse-engineer software at a m
Publikováno v:
International Conference on Cyber Warfare and Security. 18:119-127
A storage device may contain data that an individual is legally or morally not allowed to possess. Or, a disgruntled company employee may intentionally destroy corporate files, assuming once deleted the information is lost forever. The data could tak
Publikováno v:
International Conference on Cyber Warfare and Security. 17:176-184
This paper expands and builds upon previous work reported at the 2021 ICCWS concerning Executable Steganography and software intellectual property protection via fingerprinting. Software fingerprinting hides some type of unique identification into th
Publikováno v:
The Minerals, Metals & Materials Series ISBN: 9783031226335
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::60270103d6aeb322ae132b84aac68fd9
https://doi.org/10.1007/978-3-031-22634-2_19
https://doi.org/10.1007/978-3-031-22634-2_19
Publikováno v:
Security, Privacy and Reliability in Computer Communications and Networks ISBN: 9781003339410
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bf9c344e23ef695a076bcb375ad68559
https://doi.org/10.1201/9781003339410-9
https://doi.org/10.1201/9781003339410-9
Publikováno v:
European Journal of Orthopaedic Surgery & Traumatology. 31:861-869
The incidence of periprosthetic fractures is expected to rise increase by 4.6% every 10 years between 2015 and 2060. There are few large series examining optimal fixation constructs or the influence of early ambulation on outcome. The purpose of this
Autor:
William Mahoney, Kanoa Withington, Yuan-Sen Ting, Simon Prunet, Stark C. Draper, Andrew I. Sheinis, Sebastien Fabbro, Sankalp Gilda, Matthew A. Wilson
We leverage state-of-the-art machine learning methods and a decade's worth of archival data from CFHT to predict observatory image quality (IQ) from environmental conditions and observatory operating parameters. Specifically, we develop accurate and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b6566ee20245aa4f45013ec6829502f7
http://arxiv.org/abs/2107.00048
http://arxiv.org/abs/2107.00048
Publikováno v:
BigDataSE
Daily news is one of the primary needs of modern society to keep in touch with the world. Unfortunately, social media platforms have notably become a politicians’ tool for spreading propaganda campaigns and disparage opponents, which leads to side
Publikováno v:
SSPREW@ACSAC
Malware authors make use of several techniques to obfuscate code from reverse engineering tools such as IdaPro. Typically, these techniques tend to be effective for about three to six instructions, but eventually the tools can properly disassemble th