Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 14,890
1.
  • Automatic Defect Categoriza... Automatic Defect Categorization
    Thung, F.; Lo, D.; Lingxiao Jiang 2012 19th Working Conference on Reverse Engineering, 2012-Oct.
    Conference Proceeding
    Open access

    Defects are prevalent in software systems. In order to understand defects better, industry practitioners often categorize bugs into various types. One common kind of categorization is the IBM's ...
Full text
Available for: IJS, NUK, UL, UM

PDF
2.
  • A Survey on Chip to System ... A Survey on Chip to System Reverse Engineering
    Quadir, Shahed E.; Chen, Junlin; Forte, Domenic ... ACM journal on emerging technologies in computing systems, 12/2016, Volume: 13, Issue: 1
    Journal Article
    Peer reviewed

    The reverse engineering (RE) of electronic chips and systems can be used with honest and dishonest intentions. To inhibit RE for those with dishonest intentions (e.g., piracy and counterfeiting), it ...
Full text
Available for: NUK, UL
3.
  • Reverse engineering modelin... Reverse engineering modeling methods and tools: a survey
    Buonamici, Francesco; Carfagni, Monica; Furferi, Rocco ... Computer-aided design and applications, 20/5/4/, Volume: 15, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Reverse Engineering (RE) is a long-term goal of engineering and computer science; it aims at the reconstruction of CAD models from measured data by means of 3D mathematical surfaces and geometrical ...
Full text
Available for: UL

PDF
4.
  • On Reverse Engineering-Base... On Reverse Engineering-Based Hardware Trojan Detection
    Chongxi Bao; Forte, Domenic; Srivastava, Ankur IEEE transactions on computer-aided design of integrated circuits and systems, 2016-Jan., 2016-1-00, 20160101, Volume: 35, Issue: 1
    Journal Article
    Peer reviewed

    Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has attracted attention in academia ...
Full text
Available for: IJS, NUK, UL
5.
  • From predictive modelling t... From predictive modelling to machine learning and reverse engineering of colloidal self-assembly
    Dijkstra, Marjolein; Luijten, Erik Nature materials, 06/2021, Volume: 20, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    An overwhelming diversity of colloidal building blocks with distinct sizes, materials and tunable interaction potentials are now available for colloidal self-assembly. The application space for ...
Full text
Available for: GEOZS, IJS, IMTLJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBMB, UL, UM, UPUK, ZAGLJ
6.
  • Adversarial Learning Target... Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks
    Miller, David J.; Xiang, Zhen; Kesidis, George Proceedings of the IEEE, 03/2020, Volume: 108, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    With wide deployment of machine learning (ML)-based systems for a variety of applications including medical, military, automotive, genomic, multimedia, and social networking, there is great potential ...
Full text
Available for: IJS, NUK, UL

PDF
7.
  • Convex Geometry Perspective... Convex Geometry Perspective on the (Standard Model) Effective Field Theory Space
    Zhang, Cen; Zhou, Shuang-Yong Physical review letters, 11/2020, Volume: 125, Issue: 20
    Journal Article
    Peer reviewed
    Open access

    We present a convex geometry perspective to the effective field theory (EFT) parameter space. We show that the second s derivatives of the forward EFT amplitudes form a convex cone, whose extremal ...
Full text
Available for: CMK, CTK, FMFMET, IJS, NUK, PNG, UL, UM

PDF
8.
  • Classical system approach t... Classical system approach to reverse engineering
    Ivonov, A V; Volkova, E V; Daudov, I M Journal of physics. Conference series, 07/2020, Volume: 1582, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The paper presents one of the possible solutions of the reverse engineering problem from the point of view of the classical system approach, as well as highlights the direction for the development of ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
9.
  • A model‐based framework for... A model‐based framework for inter‐app Vulnerability analysis of Android applications
    Nirumand, Atefeh; Zamani, Bahman; Tork‐Ladani, Behrouz ... Software, practice & experience, April 2023, 2023-04-00, 20230401, Volume: 53, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Android users install various apps, such as banking apps, on their smart devices dealing with user‐sensitive information. The Android framework, via Inter‐Component Communication (ICC) mechanism, ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
10.
  • Protecting Software through... Protecting Software through Obfuscation
    Schrittwieser, Sebastian; Katzenbeisser, Stefan; Kinder, Johannes ... ACM computing surveys, 07/2016, Volume: 49, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
1 2 3 4 5
hits: 14,890

Load filters