نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
As the experiment area of two-oriented society in China, Changsha-Zhuzhou-Xiangtan urban agglomeration is required with high level of environment friendliness and resource saving on its transportation system. The transportation of this area has entered into the harmonized development stage of various transport modes and improved capacity and quality. But the green degree of its transportation s...
The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threa...
Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. However, not all applications require the same set of countermeasures, nor can they depend entirely on the agent system to provide them. Instead, counter...
Local scouring around bridge piers is a natural phenomenon caused by the erosive process of flowing stream on alluvial beds. The 3D flow field around bridge piers interacting with the bed materials increases complexity of local scour process. The local scour depth develops in accelerated flows and if it is not predicted correctly, the bottom level of local scour hole will exceed the original le...
Despite the use of several countermeasures, significant physiological deconditioning still occurs during long duration spaceflight. Bone loss – primarily due to the absence of loading in microgravity – is perhaps the greatest challenge to resolve. This paper describes a conceptual Gravity Loading Countermeasure Skinsuit (GLCS) that induces loading on the body to mimic standing and – when integr...
In software engineering, risks are usually considered and analysed during, or even after, the design of the system. This approach can lead to the problem of accommodating necessary countermeasures in an existing design and possible to reconsider the initial requirements of the system. In this paper, we propose a goal-oriented approach for modelling and reasoning about risks at requirements leve...
Higher-order side-channel attacks are becoming amongst the major interests of academia as well as industry sector. It is indeed being motivated by the development of countermeasures which can prevent the leakages up to certain orders. As a concrete example, threshold implementation (TI) as an efficient way to realize Boolean masking in hardware is able to avoid first-order leakages. Trivially, ...
While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerab...
The design of lightweight block ciphers has been a very active research topic over the last years. However, the lack of comparative source codes generally makes it hard to evaluate the extent to which different ciphers actually reach their low-cost goals, on different platforms. This paper reports on an initiative aimed to partially relax this issue. First, we implemented 12 block ciphers on an...
The Robot Operating System (ROS) brought together many different robotics research groups by providing a common software ecosystem. One important part of ROS is the publish-subscribe messaging infrastructure that facilitates building modular and reusable distributed robotics systems. However, the inherent complexity – flexibility, diversity and dynamics – of such a system opposes properties ess...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید