Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Eric Trias"'
Publikováno v:
44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
Proven cryptographic algorithms using adequate key sizes are widely used as the primary protection scheme for software programs and hardware circuits. However, it has been shown that detailed analysis of physical circuit manifestations reveal enough
Publikováno v:
SAC
A current means to protect intellectual property embedded in both circuits and software involves creating a functionally equivalent variant with subjective qualities related to difficulty of reverse engineering. In this paper, we consider the problem
Publikováno v:
Logic Programming ISBN: 9783540899815
ICLP
ICLP
The Set-Sharing domain has been widely used to infer at compile-time interesting properties of logic programs such as occurs-check reduction, automatic parallelization, and finite-tree analysis. However, performing abstract unification in this domain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ef2322b000015e4443acbdc46ffe9bba
https://doi.org/10.1007/978-3-540-89982-2_30
https://doi.org/10.1007/978-3-540-89982-2_30
Autor:
J. Todd McDonald, Eric Trias
Publikováno v:
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. 9:193-194
Welcome to this special issue of the Journal of Defense Modeling and Simulation on ‘Cyber Defense: Methodologies and Techniques for Evaluation’. The cyber domain has emerged as a strategic national asset of interest to both military and civilian
Autor:
Eric Trias, Karl S. Mathias
Publikováno v:
SPIE Proceedings.
One of the more difficult problems facing an analyst wishing to use a simulation is the task of collecting data and transforming it into a correctly formatted scenario. Raw data is often available from a variety of sources: multi-spectral force deplo