نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

2010
Dan Tan

As the experiment area of two-oriented society in China, Changsha-Zhuzhou-Xiangtan urban agglomeration is required with high level of environment friendliness and resource saving on its transportation system. The transportation of this area has entered into the harmonized development stage of various transport modes and improved capacity and quality. But the green degree of its transportation s...

Journal: :Entropy 2014
Bartosz Jasiul Marcin Szpyrka Joanna Sliwa

The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threa...

Journal: :Computer Communications 2000
Wayne A. Jansen

Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. However, not all applications require the same set of countermeasures, nor can they depend entirely on the agent system to provide them. Instead, counter...

A.A Dehghani M.R Pirestani T Esmaeili Tetsuya Sumi

Local scouring around bridge piers is a natural phenomenon caused by the erosive process of flowing stream on alluvial beds. The 3D flow field around bridge piers interacting with the bed materials increases complexity of local scour process. The local scour depth develops in accelerated flows and if it is not predicted correctly, the bottom level of local scour hole will exceed the original le...

2011
James M. Waldie Dava J. Newman

Despite the use of several countermeasures, significant physiological deconditioning still occurs during long duration spaceflight. Bone loss – primarily due to the absence of loading in microgravity – is perhaps the greatest challenge to resolve. This paper describes a conceptual Gravity Loading Countermeasure Skinsuit (GLCS) that induces loading on the body to mimic standing and – when integr...

2006
Yudistira Asnar Paolo Giorgini John Mylopoulos

In software engineering, risks are usually considered and analysed during, or even after, the design of the system. This approach can lead to the problem of accommodating necessary countermeasures in an existing design and possible to reconsider the initial requirements of the system. In this paper, we propose a goal-oriented approach for modelling and reasoning about risks at requirements leve...

Journal: :IACR Cryptology ePrint Archive 2015
Amir Moradi Alexander Wild

Higher-order side-channel attacks are becoming amongst the major interests of academia as well as industry sector. It is indeed being motivated by the development of countermeasures which can prevent the leakages up to certain orders. As a concrete example, threshold implementation (TI) as an efficient way to realize Boolean masking in hardware is able to avoid first-order leakages. Trivially, ...

Journal: :Speech Communication 2015
Zhizheng Wu Nicholas W. D. Evans Tomi Kinnunen Junichi Yamagishi Federico Alegre Haizhou Li

While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerab...

2012
Thomas Eisenbarth Zheng Gong Tim Güneysu Stefan Heyse Sebastiaan Indesteege Stéphanie Kerckhof François Koeune Tomislav Nad Thomas Plos Francesco Regazzoni François-Xavier Standaert Loïc van Oldeneel tot Oldenzeel

The design of lightweight block ciphers has been a very active research topic over the last years. However, the lack of comparative source codes generally makes it hard to evaluate the extent to which different ciphers actually reach their low-cost goals, on different platforms. This paper reports on an initiative aimed to partially relax this issue. First, we implemented 12 block ciphers on an...

2014
Andreas Bihlmaier Heinz Wörn

The Robot Operating System (ROS) brought together many different robotics research groups by providing a common software ecosystem. One important part of ROS is the publish-subscribe messaging infrastructure that facilitates building modular and reusable distributed robotics systems. However, the inherent complexity – flexibility, diversity and dynamics – of such a system opposes properties ess...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید