2 resultados para Cornelia Bororquia

em Research Open Access Repository of the University of East London.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ticks as vectors of several notorious zoonotic pathogens, represent an important and increasing threat for human, animal health in Europe. Recent application of new technology revealed the complexity of the tick microbiome that might impact upon its vectorial capacity. Appreciation of these complex systems is expanding our vision of tick-borne pathogens leading us to evolve a more integrated view that embraces the “pathobiome” representing the pathogenic agent integrated within its abiotic and biotic environments. In this review, we will explore how this new vision will revolutionize our understanding of tick-borne diseases. We will discuss the implications in terms of research approach for the future in order to efficiently prevent and control the threat posed by ticks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Context: Obfuscation is a common technique used to protect software against mali- cious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different ob- fuscation algorithms and implementations are available, they have never been directly compared in a large scale study. Aim: This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project manager to decide which one could be adopted. Method: In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code. Results: Results show that some of the considered obfuscations are effective in mak- ing code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the pa- per we recommend which obfuscations to select, given the security requirements of the software to be protected.