Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Moyle, Steve"'
Besides Intel's SGX technology, there are long-running discussions on how trusted computing technologies can be used to cloak malware. Past research showed example methods of malicious activities utilising Flicker, Trusted Platform Module, and recent
Externí odkaz:
http://arxiv.org/abs/2210.06792
Publikováno v:
Frontiers in Computer Science; p1-19, 19p
Autor:
Moyle, Steve
Publikováno v:
In Network Security 2007 2007(11):12-14
Autor:
Moyle, Steve
Publikováno v:
In Infosecurity 2007 4(3):36-37
Autor:
Blockeel, Hendrik, Moyle, Steve
presented by Wim Van Laer ispartof: pages:100-103 ispartof: Proceedings A of the 5th International Multi-Conference "Information Society 2002" : Data Mining and Data Warehousing / Intelligent Systems pages:100-103 ispartof: Information Society 2002 l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::876ed4899d58e77ae0df890997bb597a
https://lirias.kuleuven.be/handle/123456789/132521
https://lirias.kuleuven.be/handle/123456789/132521
Autor:
Blockeel, Hendrik, Moyle, Steve
ispartof: pages:21-28 ispartof: Proceedings of the ICML-2002 Workshop on Data Mining Lessons Learned pages:21-28 ispartof: First International Workshop on Data Mining: Lessons Learned location:Sydney, Australia date:9 Jul - 9 Jul 2002 status: publish
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::294bb8cd61de3b89ba7249fa41d43b91
https://lirias.kuleuven.be/handle/123456789/133117
https://lirias.kuleuven.be/handle/123456789/133117
Publikováno v:
Proceedings of the 2007 ACM Symposium: Applied Computing; 3/11/2007, p104-109, 6p
Publikováno v:
Data Mining & Knowledge Discovery Handbook; 2005, p1043-1056, 14p
Autor:
Heisig, Stephen, Moyle, Steve
Publikováno v:
Workshop on Self-Healing Systems; Nov2004, p80-84, 5p