Search
Now showing items 1-9 of 9
Obfuscation procedure based in dead code insertion into crypter
(IEEE, 2016)
The threat that attacks cyberspace is known as malware. In order to infect the technologic devices that are attacked, malware needs to evade the different antivirus systems. To avoid detection, an obfuscation technique ...
Obfuscation procedure based on the insertion of the dead code in the crypter by binary search
(IEEE, 2018)
What threatens the cyberspace is known as malware, which in order to infect the technological devices, it has to be capable of bypassing the antivirus motor. To avoid the antivirus detection, the malicious code requires ...
Thomas Hobbes: la resistencia política al LeviatánThomas Hobbes: Political Resistance to Leviathan
(Universitat de València. Institut de Drets Humans, 2013-12)
En el presente artículo se presentan cuatro claves de lectura de la obra de Thomas Hobbes desde las que fundamentar una noción de resistencia. Este aporte busca, en otras palabras, crear las condiciones de posibilidad de ...
The role of small separation interactions in ferrofluid structure
(2022-02-20)
Interparticle interactions in colloids are traditionally modeled by means of the DLVO theory, which includes van der Waals and electrical double layer (EDL) interactions However, the validity range limitations become ...
Televisão fechada no Brasil : identidade e alienaçãoClosed television in Brazil : identity and alienation
(Programa de Estudos Pós-Graduados em Comunicação e Semiótica da PUC-SP, 2013)
Revitalizing Imperialism: Contemporary Campaigns Against Sex Trafficking And Modern Slavery
(Universidade Estadual de Campinas UNICAMP, 2016)