Academic literature on the topic 'Software and hardware protection methods'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software and hardware protection methods.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software and hardware protection methods"
He, Gao Ming. "Research on Protection Methods of Embedded Operating System Software Based on Hardware Compiler." Applied Mechanics and Materials 443 (October 2013): 556–60. http://dx.doi.org/10.4028/www.scientific.net/amm.443.556.
Full textMamarajabov Odil Elmurzayevich. "Cloud technology to ensure the protection of fundamental methods and use of information." International Journal on Integrated Education 3, no. 10 (October 30, 2020): 313–15. http://dx.doi.org/10.31149/ijie.v3i10.780.
Full textSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Full textBawane, Manjiri R., Madhavi S. Borkar, Payal R. Wawarkar, Sanika M. Shende, Heena K. Chandel, and Ketki R. Bhakare. "USB Key Based Antipiracy Solution." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 2 (February 28, 2015): 12–17. http://dx.doi.org/10.53555/nncse.v2i2.507.
Full textBorovikov, Aleksey, Oleg Maslov, Stepan Mordvinov, and Andrei Esafiev. "Increasing Hardware-Software Platforms Trust Levels to Prevent Exploiting BIOS Vulnerabilities." Voprosy kiberbezopasnosti, no. 6(46) (2021): 68–77. http://dx.doi.org/10.21681/2311-3456-2021-6-68-77.
Full textAlekseev, V. V., V. A. Gridnev, A. V. Yakovlev, O. S. Mashkova, U. A. Savilova, D. A. Shibkov, and D. A. Yakovleva. "A System Approach to the Construction of the Software and Hardware Complex for Training Information Security Specialists." Vestnik Tambovskogo gosudarstvennogo tehnicheskogo universiteta 27, no. 1 (2021): 020–30. http://dx.doi.org/10.17277/vestnik.2021.01.pp.020-030.
Full textLobyzov, Viktor, and Vadim Shevtsov. "The concept of a Hardware-Software System for Protecting IIoT Devices." NBI Technologies, no. 2 (October 2021): 16–21. http://dx.doi.org/10.15688/nbit.jvolsu.2021.2.3.
Full textWu, Zongbo, Wenhui Xiao, Han Deng, and Lan Yang. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.122105.
Full textDeng, Han, Lan Yang, Zongbo Wu, and Wenhui Xiao. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.10046007.
Full textTian, Hong Lei, Jian Feng Liu, Yong Kuan Liu, Yuan Fang, Wen Huai Chen, and Liang Gao. "The Research on Relay Protection Settings On-Line Verification System Application in Smart Grid." Advanced Materials Research 1070-1072 (December 2014): 1378–83. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.1378.
Full textDissertations / Theses on the topic "Software and hardware protection methods"
Рой, Юлія Володимирівна. "Дослідження особливостей створення захищеної персональної інформаційної мережі житлового будинку." Master's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/38563.
Full textRelevance of research. In the modern world, network and information technologies are actively developing. At present, it is impossible to find a building within the city where connections to the data network based on Internet technologies have not been deployed. This network simplifies and optimizes many tasks, such as information exchange, working on documents, using programs, exchanging resources and information, and more. As such a building, it is advisable to consider a residential building for a certain number of apartments. Information is a very valuable resource, so attackers often try to access both corporate and home networks. The main reason for implementing network security is to protect the network and system resources connected to the network. Information in any form is considered a valuable property of the network, and its loss or access to it can cost money or, in the worst case, cause a catastrophe. Hacking a network can lead to various consequences: data interception, malware infection and destruction of all information. Therefore, it is important to pay attention to network protection, search for vulnerabilities and identify potential threats that could harm the current system and resources. The purpose of the study is to find opportunities to protect the personal information network of a residential building software and hardware. Objectives to achieve the goal: to analyze the features of designing a secure personal information network, to review network security (possible vulnerabilities, threats and attacks), to evaluate methods of threat analysis and, accordingly, to explore the possibility of solving potential threats to the network. Object of study: protected personal information network of a residential building. Subject of study: software and hardware methods of personal information network protection. Research methods algorithms and methods that are defined in the basis of the functioning of systems and technologies within a secure local area network, technologies and algorithms of local area network protection methods. Scientific novelty of the obtained results: 1) proposed options for creating a secure personal information network; 2) a sequential algorithm for configuring software methods for personal network protection is proposed. The practical implications of the findings: the results of the work can be used in the design of home networks and "home" networks of apartment buildings.
Mendoza, Jose Antonio Kougianos Elias. "Hardware & software codesign of a JPEG200 watermarking encoder." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9752.
Full textVolynkin, Alexander S. "Advanced methods for detection of malicious software." Diss., Online access via UMI:, 2007.
Find full textAravalli, SaiKrishna. "Some Novice methods for Software Protection with Obfuscation." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/479.
Full textPatel, Krutartha Computer Science & Engineering Faculty of Engineering UNSW. "Hardware-software design methods for security and reliability of MPSoCs." Awarded by:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/44854.
Full textMendoza, Jose Antonio. "Hardware and Software Codesign of a JPEG2000 Watermarking Encoder." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9752/.
Full textLei, Li. "Hardware/Software Interface Assurance with Conformance Checking." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2323.
Full textZhang, Zhao. "Software and hardware methods for memory access latency reduction on ILP processors." W&M ScholarWorks, 2002. https://scholarworks.wm.edu/etd/1539623407.
Full textJafri, Nisrine. "Formal fault injection vulnerability detection in binaries : a software process and hardware validation." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S014/document.
Full textFault injection is a well known method to test the robustness and security vulnerabilities of systems. Detecting fault injection vulnerabilities has been approached with a variety of different but limited methods. Software-based and hardware-based approaches have both been used to detect fault injection vulnerabilities. Software-based approaches can provide broad and rapid coverage, but may not correlate with genuine hardware vulnerabilities. Hardware-based approaches are indisputable in their results, but rely upon expensive expert knowledge, manual testing, and can not confirm what fault model represent the created effect. First, this thesis focuses on the software-based approach and proposes a general process that uses model checking to detect fault injection vulnerabilities in binaries. The efficacy and scalability of this process is demonstrated by detecting vulnerabilities in different cryptographic real-world implementations. Then, this thesis bridges software-based and hardware-based fault injection vulnerability detection by contrasting results of the two approaches. This demonstrates that: not all software-based vulnerabilities can be reproduced in hardware; prior conjectures on the fault model for electromagnetic pulse attacks may not be accurate; and that there is a relationship between software-based and hardware-based approaches. Further, combining both software-based and hardware-based approaches can yield a vastly more accurate and efficient approach to detect genuine fault injection vulnerabilities
Varma, Krishnaraj M. "Fast Split Arithmetic Encoder Architectures and Perceptual Coding Methods for Enhanced JPEG2000 Performance." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/26519.
Full textPh. D.
Books on the topic "Software and hardware protection methods"
Dedicated digital processors: Methods in hardware/software system design. Chichester, West Sussex, England: John Wiley, 2004.
Find full textPratt, Terrence W. Methods for design and evaluation of integrated hardware/software sytems for concurrent computation. Charlottesville, VA: Dept. of Computer Science, University of Virginia, 1987.
Find full textWagstaff, Adam. Health equity and financial protection: Streamlined analysis with ADePT software. Washington, D.C: World Bank, 2011.
Find full textF, Li Hon, Probst D. K, and IFIP WG 10 5, eds. Advances in hardware design and verification: IFIP TC10 WG10.5 International Conference on Correct Hardware and Verification Methods, 16-18 October 1997, Montreal, Canada. London: Chapman & Hall on behalf of the International Federation for Information Processing (IFIP), 1997.
Find full textDavid, Hutchison. Cryptographic Hardware and Embedded Systems – CHES 2008: 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textSchneider, Jochen. Handbuch des EDV-Rechts: Vertragsrecht (Hardware, Software, Wartung, Pflege, Systeme jeweils mit AGB), Gewährleistung, Haftung, Online, Datenschutz, Rechtsschutz. 2nd ed. Köln: O. Schmidt, 1997.
Find full textAdvanced Research Working Conference on Correct Hardware Design Methodologies (1993 Arles, France). Correct hardware design and verification methods: IFIP WG10.2 Advanced Research Working Conference, CHARME '93, Arles, Frances [sic], May 24-26, 1993 : proceedings. Berlin: Springer, 1993.
Find full textInternational School on Formal Methods for the Design of Computer, Communication, and Software Systems (6th 2006 Bertinoro, Italy). Formal methods for hardware verification: 6th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2006, Bertinoro, Italy, May 22-27, 2006 : advanced lectures. Berlin: Springer, 2006.
Find full textPreneel, Bart. Cryptographic Hardware and Embedded Systems – CHES 2011: 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings. Berlin, Heidelberg: International Association for Cryptologic Research, 2011.
Find full textE-patent strategies for software, e-commerce, the internet, telecom services, financial services, and business methods (with case studies and forecasts). Washington, DC: LBI Institute, 2000.
Find full textBook chapters on the topic "Software and hardware protection methods"
Penkin, Yu M., G. I. Khara, and A. A. Fedoseeva. "The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments." In Data-Centric Business and Applications, 589–619. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43070-2_26.
Full textShakya, Bicky, Mark M. Tehranipoor, Swarup Bhunia, and Domenic Forte. "Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation." In Hardware Protection through Obfuscation, 3–32. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49019-9_1.
Full textQin, Shengchao, Jifeng He, Zongyan Qiu, and Naixiao Zhang. "Hardware/Software Partitioning in Verilog." In Formal Methods and Software Engineering, 168–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36103-0_19.
Full textPierre, Laurence. "VHDL: A Hardware Description Language and its Simulation Semantics." In Software Specification Methods, 113–30. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0701-9_7.
Full textYu, Zhengqi, Armin Biere, and Keijo Heljanko. "Certifying Hardware Model Checking Results." In Formal Methods and Software Engineering, 498–502. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32409-4_32.
Full textOliveira, Marcel, and Jim Woodcock. "Automatic Generation of Verified Concurrent Hardware." In Formal Methods and Software Engineering, 286–306. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76650-6_17.
Full textAbdel-Hamid, Amr T., Sofiène Tahar, and John Harrison. "Enabling Hardware Verification through Design Changes." In Formal Methods and Software Engineering, 459–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36103-0_47.
Full textBelous, Anatoly, and Vitali Saladukha. "Methods of Detecting Hardware Trojans in Microcircuits." In Viruses, Hardware and Software Trojans, 453–502. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_5.
Full textKeerup, Kalmer, Dan Bogdanov, Baldur Kubo, and Per Gunnar Auran. "Privacy-Preserving Analytics, Processing and Data Management." In Big Data in Bioeconomy, 157–68. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71069-9_12.
Full textBelous, Anatoly, and Vitali Saladukha. "Information Weapon: Concepts, Means, Methods, and Examples of Application." In Viruses, Hardware and Software Trojans, 1–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_1.
Full textConference papers on the topic "Software and hardware protection methods"
Popov, S. O., P. S. Vorona, and M. V. Gushin. "The Method of Creating Diagnostic Stands for Monitoring and Control Tools Using Software and Hardware Modeling." In 2018 International Youth Scientific and Technical Conference Relay Protection and Automation (RPA). IEEE, 2018. http://dx.doi.org/10.1109/rpa.2018.8537200.
Full textXiong, Huasheng, Duo Li, and Liangju Zhang. "Test Facility Design for Integrated Digital Nuclear Reactor Protection System." In 18th International Conference on Nuclear Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/icone18-29286.
Full textZhuo, Chen, Zhao Bo, Yang Jian, and Sun Jin-long. "Research on the Reliability of Digital Instrumentation and Control System of Nuclear Power Plant Based on Dynamic Flowgraph Methodology." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67719.
Full textGeddes, Bruce, and Ray Torok. "Digital I&C Operating Experience in the US." In 16th International Conference on Nuclear Engineering. ASMEDC, 2008. http://dx.doi.org/10.1115/icone16-48862.
Full textDalpasso, Marcello, Alessandro Bogliolo, and Luca Benini. "Hardware/software IP protection." In the 37th conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/337292.337588.
Full textBao, Han, Tate Shorthill, and Hongbin Zhang. "Hazard Analysis of Digital Engineered Safety Features Actuation System in Advanced Nuclear Power Plants Using a Redundancy-Guided Approach." In 2020 International Conference on Nuclear Engineering collocated with the ASME 2020 Power Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/icone2020-16573.
Full textSheng, Xin, Xiaojin Huang, Zhencai An, and Yin Guo. "Study on an Optimization Algorithm of Generating Test Vectors for Digital Reactor Protection System Testing." In 16th International Conference on Nuclear Engineering. ASMEDC, 2008. http://dx.doi.org/10.1115/icone16-48098.
Full textMcDonald, J., Ramya Manikyam, Sébastien Bardin, Richard Bonichon, and Todd Andel. "Program Protection through Software-based Hardware Abstraction." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010557502470258.
Full textMcDonald, J., Ramya Manikyam, Sébastien Bardin, Richard Bonichon, and Todd Andel. "Program Protection through Software-based Hardware Abstraction." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010557500002998.
Full textZhang, Yu, Shijiu Jin, Shili Chen, Dongjie Tan, and Likun Wang. "Design of Fast Portable Detection Instrument for Buried Pipeline Coating Defects." In 2006 International Pipeline Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/ipc2006-10136.
Full textReports on the topic "Software and hardware protection methods"
Miller, A. C. Jr, and E. B. Grann. Advanced hardware and software methods for thread and gear dimensional metrology. CRADA final report. Office of Scientific and Technical Information (OSTI), March 1997. http://dx.doi.org/10.2172/594452.
Full textHatcher, Donald J., Terry L. DeVietti, and John A. D'Andrea. Computer Software and Hardware to Determine Contrast Sensitivity Using Three Methods: Tracking, Limits, and Constant Stimuli. Fort Belvoir, VA: Defense Technical Information Center, December 1992. http://dx.doi.org/10.21236/ada265168.
Full textFeller, D. F. The MSRC Ab Initio Methods Benchmark Suite: A measurement of hardware and software performance in the area of electronic structure methods. Office of Scientific and Technical Information (OSTI), July 1993. http://dx.doi.org/10.2172/10121145.
Full textKlymenko, Mykola V., and Andrii M. Striuk. Development of software and hardware complex of GPS-tracking. CEUR Workshop Proceedings, March 2021. http://dx.doi.org/10.31812/123456789/4430.
Full textVakaliuk, Tetiana A., Valerii V. Kontsedailo, Dmytro S. Antoniuk, Olha V. Korotun, Iryna S. Mintii, and Andrey V. Pikilnyak. Using game simulator Software Inc in the Software Engineering education. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3762.
Full textVarina, Hanna B., Viacheslav V. Osadchyi, Kateryna P. Osadcha, Svetlana V. Shevchenko, and Svitlana H. Lytvynova. Peculiarities of cloud computing use in the process of the first-year students' adaptive potential development. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4453.
Full textModlo, Yevhenii O., Serhiy O. Semerikov, Stanislav L. Bondarevskyi, Stanislav T. Tolmachev, Oksana M. Markova, and Pavlo P. Nechypurenko. Methods of using mobile Internet devices in the formation of the general scientific component of bachelor in electromechanics competency in modeling of technical objects. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3677.
Full textLavrentieva, Olena O., Ihor O. Arkhypov, Olexander I. Kuchma, and Aleksandr D. Uchitel. Use of simulators together with virtual and augmented reality in the system of welders’ vocational training: past, present, and future. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3748.
Full textMartyniuk, Oleksandr O., Oleksandr S. Martyniuk, and Ivan O. Muzyka. Formation of informational and digital competence of secondary school students in laboratory work in physics. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4446.
Full text