Добірка наукової літератури з теми "Software and hardware protection methods"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Software and hardware protection methods".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Software and hardware protection methods"
He, Gao Ming. "Research on Protection Methods of Embedded Operating System Software Based on Hardware Compiler." Applied Mechanics and Materials 443 (October 2013): 556–60. http://dx.doi.org/10.4028/www.scientific.net/amm.443.556.
Повний текст джерелаMamarajabov Odil Elmurzayevich. "Cloud technology to ensure the protection of fundamental methods and use of information." International Journal on Integrated Education 3, no. 10 (October 30, 2020): 313–15. http://dx.doi.org/10.31149/ijie.v3i10.780.
Повний текст джерелаSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Повний текст джерелаBawane, Manjiri R., Madhavi S. Borkar, Payal R. Wawarkar, Sanika M. Shende, Heena K. Chandel, and Ketki R. Bhakare. "USB Key Based Antipiracy Solution." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 2 (February 28, 2015): 12–17. http://dx.doi.org/10.53555/nncse.v2i2.507.
Повний текст джерелаBorovikov, Aleksey, Oleg Maslov, Stepan Mordvinov, and Andrei Esafiev. "Increasing Hardware-Software Platforms Trust Levels to Prevent Exploiting BIOS Vulnerabilities." Voprosy kiberbezopasnosti, no. 6(46) (2021): 68–77. http://dx.doi.org/10.21681/2311-3456-2021-6-68-77.
Повний текст джерелаAlekseev, V. V., V. A. Gridnev, A. V. Yakovlev, O. S. Mashkova, U. A. Savilova, D. A. Shibkov, and D. A. Yakovleva. "A System Approach to the Construction of the Software and Hardware Complex for Training Information Security Specialists." Vestnik Tambovskogo gosudarstvennogo tehnicheskogo universiteta 27, no. 1 (2021): 020–30. http://dx.doi.org/10.17277/vestnik.2021.01.pp.020-030.
Повний текст джерелаLobyzov, Viktor, and Vadim Shevtsov. "The concept of a Hardware-Software System for Protecting IIoT Devices." NBI Technologies, no. 2 (October 2021): 16–21. http://dx.doi.org/10.15688/nbit.jvolsu.2021.2.3.
Повний текст джерелаWu, Zongbo, Wenhui Xiao, Han Deng, and Lan Yang. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.122105.
Повний текст джерелаDeng, Han, Lan Yang, Zongbo Wu, and Wenhui Xiao. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.10046007.
Повний текст джерелаTian, Hong Lei, Jian Feng Liu, Yong Kuan Liu, Yuan Fang, Wen Huai Chen, and Liang Gao. "The Research on Relay Protection Settings On-Line Verification System Application in Smart Grid." Advanced Materials Research 1070-1072 (December 2014): 1378–83. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.1378.
Повний текст джерелаДисертації з теми "Software and hardware protection methods"
Рой, Юлія Володимирівна. "Дослідження особливостей створення захищеної персональної інформаційної мережі житлового будинку". Master's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/38563.
Повний текст джерелаRelevance of research. In the modern world, network and information technologies are actively developing. At present, it is impossible to find a building within the city where connections to the data network based on Internet technologies have not been deployed. This network simplifies and optimizes many tasks, such as information exchange, working on documents, using programs, exchanging resources and information, and more. As such a building, it is advisable to consider a residential building for a certain number of apartments. Information is a very valuable resource, so attackers often try to access both corporate and home networks. The main reason for implementing network security is to protect the network and system resources connected to the network. Information in any form is considered a valuable property of the network, and its loss or access to it can cost money or, in the worst case, cause a catastrophe. Hacking a network can lead to various consequences: data interception, malware infection and destruction of all information. Therefore, it is important to pay attention to network protection, search for vulnerabilities and identify potential threats that could harm the current system and resources. The purpose of the study is to find opportunities to protect the personal information network of a residential building software and hardware. Objectives to achieve the goal: to analyze the features of designing a secure personal information network, to review network security (possible vulnerabilities, threats and attacks), to evaluate methods of threat analysis and, accordingly, to explore the possibility of solving potential threats to the network. Object of study: protected personal information network of a residential building. Subject of study: software and hardware methods of personal information network protection. Research methods algorithms and methods that are defined in the basis of the functioning of systems and technologies within a secure local area network, technologies and algorithms of local area network protection methods. Scientific novelty of the obtained results: 1) proposed options for creating a secure personal information network; 2) a sequential algorithm for configuring software methods for personal network protection is proposed. The practical implications of the findings: the results of the work can be used in the design of home networks and "home" networks of apartment buildings.
Mendoza, Jose Antonio Kougianos Elias. "Hardware & software codesign of a JPEG200 watermarking encoder." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9752.
Повний текст джерелаVolynkin, Alexander S. "Advanced methods for detection of malicious software." Diss., Online access via UMI:, 2007.
Знайти повний текст джерелаAravalli, SaiKrishna. "Some Novice methods for Software Protection with Obfuscation." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/479.
Повний текст джерелаPatel, Krutartha Computer Science & Engineering Faculty of Engineering UNSW. "Hardware-software design methods for security and reliability of MPSoCs." Awarded by:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/44854.
Повний текст джерелаMendoza, Jose Antonio. "Hardware and Software Codesign of a JPEG2000 Watermarking Encoder." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9752/.
Повний текст джерелаLei, Li. "Hardware/Software Interface Assurance with Conformance Checking." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2323.
Повний текст джерелаZhang, Zhao. "Software and hardware methods for memory access latency reduction on ILP processors." W&M ScholarWorks, 2002. https://scholarworks.wm.edu/etd/1539623407.
Повний текст джерелаJafri, Nisrine. "Formal fault injection vulnerability detection in binaries : a software process and hardware validation." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S014/document.
Повний текст джерелаFault injection is a well known method to test the robustness and security vulnerabilities of systems. Detecting fault injection vulnerabilities has been approached with a variety of different but limited methods. Software-based and hardware-based approaches have both been used to detect fault injection vulnerabilities. Software-based approaches can provide broad and rapid coverage, but may not correlate with genuine hardware vulnerabilities. Hardware-based approaches are indisputable in their results, but rely upon expensive expert knowledge, manual testing, and can not confirm what fault model represent the created effect. First, this thesis focuses on the software-based approach and proposes a general process that uses model checking to detect fault injection vulnerabilities in binaries. The efficacy and scalability of this process is demonstrated by detecting vulnerabilities in different cryptographic real-world implementations. Then, this thesis bridges software-based and hardware-based fault injection vulnerability detection by contrasting results of the two approaches. This demonstrates that: not all software-based vulnerabilities can be reproduced in hardware; prior conjectures on the fault model for electromagnetic pulse attacks may not be accurate; and that there is a relationship between software-based and hardware-based approaches. Further, combining both software-based and hardware-based approaches can yield a vastly more accurate and efficient approach to detect genuine fault injection vulnerabilities
Varma, Krishnaraj M. "Fast Split Arithmetic Encoder Architectures and Perceptual Coding Methods for Enhanced JPEG2000 Performance." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/26519.
Повний текст джерелаPh. D.
Книги з теми "Software and hardware protection methods"
Dedicated digital processors: Methods in hardware/software system design. Chichester, West Sussex, England: John Wiley, 2004.
Знайти повний текст джерелаPratt, Terrence W. Methods for design and evaluation of integrated hardware/software sytems for concurrent computation. Charlottesville, VA: Dept. of Computer Science, University of Virginia, 1987.
Знайти повний текст джерелаWagstaff, Adam. Health equity and financial protection: Streamlined analysis with ADePT software. Washington, D.C: World Bank, 2011.
Знайти повний текст джерелаF, Li Hon, Probst D. K, and IFIP WG 10 5, eds. Advances in hardware design and verification: IFIP TC10 WG10.5 International Conference on Correct Hardware and Verification Methods, 16-18 October 1997, Montreal, Canada. London: Chapman & Hall on behalf of the International Federation for Information Processing (IFIP), 1997.
Знайти повний текст джерелаDavid, Hutchison. Cryptographic Hardware and Embedded Systems – CHES 2008: 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Знайти повний текст джерелаSchneider, Jochen. Handbuch des EDV-Rechts: Vertragsrecht (Hardware, Software, Wartung, Pflege, Systeme jeweils mit AGB), Gewährleistung, Haftung, Online, Datenschutz, Rechtsschutz. 2nd ed. Köln: O. Schmidt, 1997.
Знайти повний текст джерелаAdvanced Research Working Conference on Correct Hardware Design Methodologies (1993 Arles, France). Correct hardware design and verification methods: IFIP WG10.2 Advanced Research Working Conference, CHARME '93, Arles, Frances [sic], May 24-26, 1993 : proceedings. Berlin: Springer, 1993.
Знайти повний текст джерелаInternational School on Formal Methods for the Design of Computer, Communication, and Software Systems (6th 2006 Bertinoro, Italy). Formal methods for hardware verification: 6th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2006, Bertinoro, Italy, May 22-27, 2006 : advanced lectures. Berlin: Springer, 2006.
Знайти повний текст джерелаPreneel, Bart. Cryptographic Hardware and Embedded Systems – CHES 2011: 13th International Workshop, Nara, Japan, September 28 – October 1, 2011. Proceedings. Berlin, Heidelberg: International Association for Cryptologic Research, 2011.
Знайти повний текст джерелаE-patent strategies for software, e-commerce, the internet, telecom services, financial services, and business methods (with case studies and forecasts). Washington, DC: LBI Institute, 2000.
Знайти повний текст джерелаЧастини книг з теми "Software and hardware protection methods"
Penkin, Yu M., G. I. Khara, and A. A. Fedoseeva. "The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments." In Data-Centric Business and Applications, 589–619. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43070-2_26.
Повний текст джерелаShakya, Bicky, Mark M. Tehranipoor, Swarup Bhunia, and Domenic Forte. "Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation." In Hardware Protection through Obfuscation, 3–32. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49019-9_1.
Повний текст джерелаQin, Shengchao, Jifeng He, Zongyan Qiu, and Naixiao Zhang. "Hardware/Software Partitioning in Verilog." In Formal Methods and Software Engineering, 168–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36103-0_19.
Повний текст джерелаPierre, Laurence. "VHDL: A Hardware Description Language and its Simulation Semantics." In Software Specification Methods, 113–30. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0701-9_7.
Повний текст джерелаYu, Zhengqi, Armin Biere, and Keijo Heljanko. "Certifying Hardware Model Checking Results." In Formal Methods and Software Engineering, 498–502. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32409-4_32.
Повний текст джерелаOliveira, Marcel, and Jim Woodcock. "Automatic Generation of Verified Concurrent Hardware." In Formal Methods and Software Engineering, 286–306. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76650-6_17.
Повний текст джерелаAbdel-Hamid, Amr T., Sofiène Tahar, and John Harrison. "Enabling Hardware Verification through Design Changes." In Formal Methods and Software Engineering, 459–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36103-0_47.
Повний текст джерелаBelous, Anatoly, and Vitali Saladukha. "Methods of Detecting Hardware Trojans in Microcircuits." In Viruses, Hardware and Software Trojans, 453–502. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_5.
Повний текст джерелаKeerup, Kalmer, Dan Bogdanov, Baldur Kubo, and Per Gunnar Auran. "Privacy-Preserving Analytics, Processing and Data Management." In Big Data in Bioeconomy, 157–68. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71069-9_12.
Повний текст джерелаBelous, Anatoly, and Vitali Saladukha. "Information Weapon: Concepts, Means, Methods, and Examples of Application." In Viruses, Hardware and Software Trojans, 1–99. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_1.
Повний текст джерелаТези доповідей конференцій з теми "Software and hardware protection methods"
Popov, S. O., P. S. Vorona, and M. V. Gushin. "The Method of Creating Diagnostic Stands for Monitoring and Control Tools Using Software and Hardware Modeling." In 2018 International Youth Scientific and Technical Conference Relay Protection and Automation (RPA). IEEE, 2018. http://dx.doi.org/10.1109/rpa.2018.8537200.
Повний текст джерелаXiong, Huasheng, Duo Li, and Liangju Zhang. "Test Facility Design for Integrated Digital Nuclear Reactor Protection System." In 18th International Conference on Nuclear Engineering. ASMEDC, 2010. http://dx.doi.org/10.1115/icone18-29286.
Повний текст джерелаZhuo, Chen, Zhao Bo, Yang Jian, and Sun Jin-long. "Research on the Reliability of Digital Instrumentation and Control System of Nuclear Power Plant Based on Dynamic Flowgraph Methodology." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67719.
Повний текст джерелаGeddes, Bruce, and Ray Torok. "Digital I&C Operating Experience in the US." In 16th International Conference on Nuclear Engineering. ASMEDC, 2008. http://dx.doi.org/10.1115/icone16-48862.
Повний текст джерелаDalpasso, Marcello, Alessandro Bogliolo, and Luca Benini. "Hardware/software IP protection." In the 37th conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/337292.337588.
Повний текст джерелаBao, Han, Tate Shorthill, and Hongbin Zhang. "Hazard Analysis of Digital Engineered Safety Features Actuation System in Advanced Nuclear Power Plants Using a Redundancy-Guided Approach." In 2020 International Conference on Nuclear Engineering collocated with the ASME 2020 Power Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/icone2020-16573.
Повний текст джерелаSheng, Xin, Xiaojin Huang, Zhencai An, and Yin Guo. "Study on an Optimization Algorithm of Generating Test Vectors for Digital Reactor Protection System Testing." In 16th International Conference on Nuclear Engineering. ASMEDC, 2008. http://dx.doi.org/10.1115/icone16-48098.
Повний текст джерелаMcDonald, J., Ramya Manikyam, Sébastien Bardin, Richard Bonichon, and Todd Andel. "Program Protection through Software-based Hardware Abstraction." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010557502470258.
Повний текст джерелаMcDonald, J., Ramya Manikyam, Sébastien Bardin, Richard Bonichon, and Todd Andel. "Program Protection through Software-based Hardware Abstraction." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010557500002998.
Повний текст джерелаZhang, Yu, Shijiu Jin, Shili Chen, Dongjie Tan, and Likun Wang. "Design of Fast Portable Detection Instrument for Buried Pipeline Coating Defects." In 2006 International Pipeline Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/ipc2006-10136.
Повний текст джерелаЗвіти організацій з теми "Software and hardware protection methods"
Miller, A. C. Jr, and E. B. Grann. Advanced hardware and software methods for thread and gear dimensional metrology. CRADA final report. Office of Scientific and Technical Information (OSTI), March 1997. http://dx.doi.org/10.2172/594452.
Повний текст джерелаHatcher, Donald J., Terry L. DeVietti, and John A. D'Andrea. Computer Software and Hardware to Determine Contrast Sensitivity Using Three Methods: Tracking, Limits, and Constant Stimuli. Fort Belvoir, VA: Defense Technical Information Center, December 1992. http://dx.doi.org/10.21236/ada265168.
Повний текст джерелаFeller, D. F. The MSRC Ab Initio Methods Benchmark Suite: A measurement of hardware and software performance in the area of electronic structure methods. Office of Scientific and Technical Information (OSTI), July 1993. http://dx.doi.org/10.2172/10121145.
Повний текст джерелаKlymenko, Mykola V., and Andrii M. Striuk. Development of software and hardware complex of GPS-tracking. CEUR Workshop Proceedings, March 2021. http://dx.doi.org/10.31812/123456789/4430.
Повний текст джерелаVakaliuk, Tetiana A., Valerii V. Kontsedailo, Dmytro S. Antoniuk, Olha V. Korotun, Iryna S. Mintii, and Andrey V. Pikilnyak. Using game simulator Software Inc in the Software Engineering education. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3762.
Повний текст джерелаVarina, Hanna B., Viacheslav V. Osadchyi, Kateryna P. Osadcha, Svetlana V. Shevchenko, and Svitlana H. Lytvynova. Peculiarities of cloud computing use in the process of the first-year students' adaptive potential development. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4453.
Повний текст джерелаModlo, Yevhenii O., Serhiy O. Semerikov, Stanislav L. Bondarevskyi, Stanislav T. Tolmachev, Oksana M. Markova, and Pavlo P. Nechypurenko. Methods of using mobile Internet devices in the formation of the general scientific component of bachelor in electromechanics competency in modeling of technical objects. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3677.
Повний текст джерелаLavrentieva, Olena O., Ihor O. Arkhypov, Olexander I. Kuchma, and Aleksandr D. Uchitel. Use of simulators together with virtual and augmented reality in the system of welders’ vocational training: past, present, and future. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3748.
Повний текст джерелаMartyniuk, Oleksandr O., Oleksandr S. Martyniuk, and Ivan O. Muzyka. Formation of informational and digital competence of secondary school students in laboratory work in physics. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4446.
Повний текст джерела