Zobrazeno 1 - 10
of 1 866
pro vyhledávání: '"attack examples"'
Publikováno v:
In Computers & Security June 2016 59:186-209
Publikováno v:
ISQED
FPGAs gain increasing utilization in system prototyping, low-volume products, and obsolete component replacement. Driven by high profits, FPGA deployment is suffering from various attacks, such as reverse engineering bitstream, functionality tamperin
Autor:
Bell, William C.1 wbell@rx.uga.edu, Dallas, Cham E.1 cdallas@rx.uga.edu
Publikováno v:
International Journal of Health Geographics. 2007, Vol. 6, p5-33. 33p. 4 Charts, 2 Graphs, 14 Maps.
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Computers & Security. 59:186-209
The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and thus the human element remains a weak lin
Autor:
Dallas Cham E, Bell William C
Publikováno v:
International Journal of Health Geographics, Vol 6, Iss 1, p 5 (2007)
Abstract Background The threat posed by the use of weapons of mass destruction (WMD) within the United States has grown significantly in recent years, focusing attention on the medical and public health disaster capabilities of the nation in a large
Externí odkaz:
https://doaj.org/article/c3a1ea403f83477999e4f706c59fb4dd
Autor:
Heather Harrison Dinniss
Publikováno v:
Cyberwarfare and the Laws of War
Autor:
Qifeng Sun, Xingzhe Huang, Godfrey Kibalya, Neeraj Kumar, S. V. N. Santhosh Kumar, Peiying Zhang, Dongliang Xie
Publikováno v:
IEEE Access, Vol 9, Pp 104183-104196 (2021)
Deep learning model shows great advantages in various fields. However, researchers pay attention to how to improve the accuracy of the model, while ignoring the security considerations. The problem of controlling the judgment result of deep learning
Externí odkaz:
https://doaj.org/article/e518a2ba15c0472dad448fc5fa40f1bb
Publikováno v:
Social Network Analysis & Mining; 11/24/2024, Vol. 14 Issue 1, p1-12, 12p
Autor:
Cham E. Dallas, William C. Bell
Publikováno v:
International Journal of Health Geographics, Vol 6, Iss 1, p 5 (2007)
International Journal of Health Geographics
International Journal of Health Geographics
Background The threat posed by the use of weapons of mass destruction (WMD) within the United States has grown significantly in recent years, focusing attention on the medical and public health disaster capabilities of the nation in a large scale cri