default search action
"Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus."
Carolina Zarate et al. (2014)
- Carolina Zarate, Simson L. Garfinkel, Aubin Heffernan, Scott Horras, Kyle Gorak:
Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus. IFIP Int. Conf. Digital Forensics 2014: 117-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.