Intrusive Viruses Depth Analysis and Teaching Research
نویسندگان
چکیده
منابع مشابه
comparative analysis of the use of hedges & emphatics in english and persian academic research articles of sociology & psychology
چکیده ندارد.
15 صفحه اولIntrusive and non-intrusive watermarking
“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.
متن کاملAnalysis and Research on Low-Cost and Non-Intrusive Power Metering Chip
Metering technology is one of the core technologies of the smart power grid. The overall metering solution and related products have a wide market space in the whole process of power production, which bring new opportunities for power distribution development from automation to intelligentialize, and provide technical supports for the power metering system platform. Because of the importance of...
متن کاملDefense-in-depth against computer viruses
In this paper, we discuss software based fault tolerant computing techniques used in defense against computer viruses and other integrity corruptions in modern computer systems. We begin with a summary of research on computer viruses, their potential for harm, and the extent to which this potential has been realized to date. We then examine major results on the application of fault tolerant sof...
متن کاملResearch and Teaching Statement
Cryptology consists of two complementary fields of research. One is cryptography where the development of new schemes or algorithms are concerned with its security analysis. The other one is cryptanalysis where attacks for the cryptographic algorithms are being studied. Hash function, message authentication code (or MAC), encryption and authenticated encryption are widely used objects in crypto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Computer Science and Engineering
سال: 2017
ISSN: 2475-8841
DOI: 10.12783/dtcse/itms2016/9456