UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 7.280
1.
Celotno besedilo

PDF
2.
Celotno besedilo

PDF
3.
  • On Reverse Engineering-Base... On Reverse Engineering-Based Hardware Trojan Detection
    Chongxi Bao; Forte, Domenic; Srivastava, Ankur IEEE transactions on computer-aided design of integrated circuits and systems, 2016-Jan., 2016-1-00, 20160101, Letnik: 35, Številka: 1
    Journal Article
    Recenzirano

    Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has attracted attention in academia ...
Celotno besedilo
4.
Celotno besedilo
5.
  • Adversarial Learning Target... Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks
    Miller, David J.; Xiang, Zhen; Kesidis, George Proceedings of the IEEE, 03/2020, Letnik: 108, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    With wide deployment of machine learning (ML)-based systems for a variety of applications including medical, military, automotive, genomic, multimedia, and social networking, there is great potential ...
Celotno besedilo

PDF
6.
Celotno besedilo

PDF
7.
  • Classical system approach t... Classical system approach to reverse engineering
    Ivonov, A V; Volkova, E V; Daudov, I M Journal of physics. Conference series, 07/2020, Letnik: 1582, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The paper presents one of the possible solutions of the reverse engineering problem from the point of view of the classical system approach, as well as highlights the direction for the development of ...
Celotno besedilo

PDF
8.
  • A model‐based framework for... A model‐based framework for inter‐app Vulnerability analysis of Android applications
    Nirumand, Atefeh; Zamani, Bahman; Tork‐Ladani, Behrouz ... Software, practice & experience, April 2023, 2023-04-00, 20230401, Letnik: 53, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Android users install various apps, such as banking apps, on their smart devices dealing with user‐sensitive information. The Android framework, via Inter‐Component Communication (ICC) mechanism, ...
Celotno besedilo
9.
  • Protecting Software through... Protecting Software through Obfuscation
    Schrittwieser, Sebastian; Katzenbeisser, Stefan; Kinder, Johannes ... ACM computing surveys, 07/2016, Letnik: 49, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread ...
Celotno besedilo
10.
  • A digital construction fram... A digital construction framework integrating building information modeling and reverse engineering technologies for renovation projects
    Ding, Zhikun; Liu, Shan; Liao, Longhui ... Automation in construction, June 2019, 2019-06-00, 20190601, Letnik: 102
    Journal Article
    Recenzirano

    This study proposes a digital construction framework that integrates building information modeling (BIM) and reverse engineering (RE) to improve information utilization in different phases and thus ...
Celotno besedilo
1 2 3 4 5
zadetkov: 7.280

Nalaganje filtrov