Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Resh, Amit"'
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030801182
The current study address the question: can consumer-oriented Web of Things (WoT) leverage personal sports achievements? If properly exploited, accurate data collected via WoT architecture can help to gain valuable insights regarding personal sport a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::54e05e912e30e8468c8b12554eb362b8
https://doi.org/10.1007/978-3-030-80119-9_75
https://doi.org/10.1007/978-3-030-80119-9_75
The blue pill is a malicious stealthy hypervisor-based rootkit. The red pill is a software package that is designed to detect such blue pills. Since the blue pill was originally proposed there has been an ongoing arms race between developers that try
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::43b555cc2615b1d0d84fe9c1c30c6182
http://urn.fi/URN:NBN:fi:jyu-202001071039
http://urn.fi/URN:NBN:fi:jyu-202001071039
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::7d131e2484a16868f23edc6aa3934dd9
http://urn.fi/URN:NBN:fi:jyu-201801181268
http://urn.fi/URN:NBN:fi:jyu-201801181268
The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are div
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::2d11962ee4a251b4df0388d9a69c1557
http://urn.fi/URN:NBN:fi:jyu-201801181269
http://urn.fi/URN:NBN:fi:jyu-201801181269
Autor:
Resh, Amit
The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are div
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1222::f517dc3b7d794fd5fc3aba99406117ab
http://urn.fi/URN:ISBN:978-951-39-6887-8
http://urn.fi/URN:ISBN:978-951-39-6887-8
Publikováno v:
2015 IEEE 2nd International Conference on Cyber Security & Cloud Computing; 2015, p335-341, 7p
Publikováno v:
Cyber Security: Analytics, Technology & Automation; 2015, p205-212, 8p
Autor:
Zaidenberg, Nezer, Resh, Amit
Publikováno v:
Cyber Security: Analytics, Technology & Automation; 2015, p183-194, 12p