Zobrazeno 1 - 10
of 102
pro vyhledávání: '"Information leak"'
Publikováno v:
Applied Sciences, Vol 13, Iss 23, p 12556 (2023)
We propose CanaryExp, an exploitability evaluation solution for vulnerabilities among binary programs protected by StackGuard. CanaryExp devises three novel techniques, namely canary leakage proof of concept generation, canary leaking analysis time e
Externí odkaz:
https://doaj.org/article/478bb58d0af44537be06aad3d21bcc5b
Publikováno v:
IEEE Access, Vol 10, Pp 55459-55468 (2022)
Conventional membership inference attacks usually require a large number of queries of the target model when training shadow models, and this task becomes extremely difficult when the number of queries is limited. Aiming at the problem of insufficien
Externí odkaz:
https://doaj.org/article/fdc5b99f587249fab6251accde6a5c77
Autor:
Mutaz Y. Melhem, Laszlo B. Kish
Publikováno v:
Metrology and Measurement Systems, Vol vol. 26, Iss No 4, Pp 607-616 (2019)
A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system is studied with unknown parasitic DC-voltage sources at both Alice’s and Bob’s ends. This paper is the generalization of our earlier investigation with a s
Externí odkaz:
https://doaj.org/article/7e8d393e38414780b0d6f4ac8fc4ad40
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Valeriu Ungureanu
Publikováno v:
Computer Science Journal of Moldova, Vol 24, Iss 1(70), Pp 83-105 (2016)
We consider pseudo-simultaneous normal form games - strategic games with rules violated by information leaks and simultaneity corruption. We provide classification and construction of a game taxonomy based on applicable solution principles. Existence
Externí odkaz:
https://doaj.org/article/3be2a1511d064d7797a517680717c445
Autor:
Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato, Hideo Taniguchi
Publikováno v:
2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW). :352-358
To handle information leaks caused by administrative errors or mishandling, a function for tracing the diffusion of classified information using a virtual machine monitor (VMM) was proposed. However, the proposed function has not been investigated in
Publikováno v:
Ukrainian Information Security Research Journal; Vol. 23 No. 4 (2021): Information security; 234-240
Защита информации; Том 23 № 4 (2021): Защита информации; 234-240
Захист інформації; Том 23 № 4 (2021): Захист інформації ; 234-240
Защита информации; Том 23 № 4 (2021): Защита информации; 234-240
Захист інформації; Том 23 № 4 (2021): Захист інформації ; 234-240
The block diagram of a modern means of special reconnaissance, which allows intercepting spurious electromagnetic radiation from monitor screens on rare-crystal structures, is considered. It is shown that modern digital signal processing technologies
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=aviationuniv::935a1d94f2bca168156806f8e7ca7154
https://jrnl.nau.edu.ua/index.php/ZI/article/view/16770
https://jrnl.nau.edu.ua/index.php/ZI/article/view/16770
Autor:
A. В. Lachikhina, A. A. Petrakov
Publikováno v:
Радиопромышленность, Vol 31, Iss 2, Pp 72-78 (2021)
Problem statement. Currently, the issue of controlling the confidentiality of information in documents created, processed, transmitted and stored in the corporate information system (after of the documents open) is one of the most acute in ensuring t