Home > Research > Browse

Results for Obfuscation

Publications & Outputs

  1. Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X. & Wang, Z., 05/2018, In: Computers and Security. 74, p. 202-220 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. ‘Metaphoring’ people out of this world: a critical discourse analysis of a chairman’s statement of a UK defence firm

    Merkl-Davies, D. & Koller, V., 09/2012, In: Accounting Forum. 36, 3, p. 178-193 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Evading virus detection using code obfuscation

    Murad, K., Shirazi, S. N., Bin Zikria, Y. & Ikram, N., 2010, Future Generation Information Technology. Kim, T. H., Lee, Y. H., Kang, B. H. & Slezak, D. (eds.). Springer, p. 394-401 8 p. (Lecture Notes in Computer Science; vol. 6485).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review