Добірка наукової літератури з теми "White-box Analysis"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "White-box Analysis".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "White-box Analysis"
Chitic, Raluca, Ali Osman Topal, and Franck Leprévost. "Empirical Perturbation Analysis of Two Adversarial Attacks: Black Box versus White Box." Applied Sciences 12, no. 14 (July 21, 2022): 7339. http://dx.doi.org/10.3390/app12147339.
Повний текст джерелаPintelas, Emmanuel, Ioannis E. Livieris, and Panagiotis Pintelas. "A Grey-Box Ensemble Model Exploiting Black-Box Accuracy and White-Box Intrinsic Interpretability." Algorithms 13, no. 1 (January 5, 2020): 17. http://dx.doi.org/10.3390/a13010017.
Повний текст джерелаVelez, Miguel, Pooyan Jamshidi, Florian Sattler, Norbert Siegmund, Sven Apel, and Christian Kästner. "ConfigCrusher: towards white-box performance analysis for configurable systems." Automated Software Engineering 27, no. 3-4 (August 5, 2020): 265–300. http://dx.doi.org/10.1007/s10515-020-00273-8.
Повний текст джерелаPang, Siyu, Tingting Lin, Xuejia Lai, and Zheng Gong. "A White-Box Implementation of IDEA." Symmetry 13, no. 6 (June 15, 2021): 1066. http://dx.doi.org/10.3390/sym13061066.
Повний текст джерелаHasan, Md Moudud, Md Shariot Ullah, Ajoy Kumar Saha, and MG Mostofa Amin. "Comparing the performances of multiple rainfall-runoff models of a karst watershed." Asian-Australasian Journal of Bioscience and Biotechnology 6, no. 1 (July 18, 2021): 26–39. http://dx.doi.org/10.3329/aajbb.v6i1.54878.
Повний текст джерелаLEE, Seungkwang. "A White-Box Cryptographic Implementation for Protecting against Power Analysis." IEICE Transactions on Information and Systems E101.D, no. 1 (2018): 249–52. http://dx.doi.org/10.1587/transinf.2017edl8186.
Повний текст джерелаGrujicic, M., V. Chenna, R. Galgalikar, J. S. Snipes, S. Ramaswami, and R. Yavari. "Computational analysis of gear-box roller-bearing white-etch cracking." International Journal of Structural Integrity 5, no. 4 (November 11, 2014): 290–327. http://dx.doi.org/10.1108/ijsi-10-2013-0028.
Повний текст джерелаZhang, Chao, and Yu Wang. "Research on the Structure of Authentication Protocol Analysis Based on MSCs/Promela." Advanced Materials Research 989-994 (July 2014): 4698–703. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4698.
Повний текст джерелаKRISHNA MOHAN, K., A. K. VERMA, A. SRIVIDYA, and LJUBISA PAPIC. "INTEGRATION OF BLACK-BOX AND WHITE-BOX MODELING APPROACHES FOR SOFTWARE RELIABILITY ESTIMATION." International Journal of Reliability, Quality and Safety Engineering 17, no. 03 (June 2010): 261–73. http://dx.doi.org/10.1142/s0218539310003792.
Повний текст джерелаXie, Li, Jiang Yu, Shuang Li, and Sha Sha Diao. "Analysis of Volatile Organic Compounds in Disposable Food Packages at Three types of Temperature." Advanced Materials Research 476-478 (February 2012): 2625–29. http://dx.doi.org/10.4028/www.scientific.net/amr.476-478.2625.
Повний текст джерелаДисертації з теми "White-box Analysis"
Truong, Nghi Khue Dinh. "A web-based programming environment for novice programmers." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16471/1/Nghi_Truong_Thesis.pdf.
Повний текст джерелаTruong, Nghi Khue Dinh. "A web-based programming environment for novice programmers." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16471/.
Повний текст джерелаHarston, Walter Andrew. "Facies and Reservoir Characterization of the Permian White Rim Sandstone, Black Box Dolomite, and Black Dragon Member of the Triassic Moenkopi Formation for CO2 Storage and Sequestration at Woodside Field, East-Central Utah." BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3567.
Повний текст джерелаShao, Danhua. "Application of local semantic analysis in fault prediction and detection." Thesis, 2010. http://hdl.handle.net/2152/ETD-UT-2010-05-1086.
Повний текст джерелаtext
Fattal, Feras. "High frequency model for transient analysis of transformer windings using multiconductor transmission line theory." 2017. http://hdl.handle.net/1993/32172.
Повний текст джерелаMay 2017
Filipe, Ricardo Ângelo Santos. "Client-Side Monitoring of Distributed Systems." Doctoral thesis, 2020. http://hdl.handle.net/10316/91181.
Повний текст джерелаFrom critical systems to entertainment, most computer systems have become distributed. Compared to standalone applications, distributed systems are more complex, dificult to operate and maintain, thus increasing the probability for outages or other malfunctions. Properly monitoring the system is therefore even more important. However, recovering a complete image of the system is a herculean task for administrators, who often need to resort to a large plethora of tools. Despite all these tools, the person that many times identifies the degradation or the system outage is the one that is somehow disregarded in the monitoring chain - the client. Almost daily, we have examples in the news from companies that had outages or system degradation perceived by the final client with a direct impact on the companies' revenues and image. The lack of client-side monitoring and the opportunity to improve current monitoring mechanisms paved the way for the key research question in this thesis. We argue that the client has information on the distributed system that monitoring applications should use to improve performance and resilience. In this work, we aim to evaluate the limits of black-box client-side monitoring and to extend white-box with client information. Additionally, we are very interested to understand what kind of information does the system leak to the client. To evaluate this approach, we resorted to several experiments in distinct scenarios from three-tier web sites to microservice architectures, where we tried to identify performance issues from the client-side point-of-view. We used client profiling, machine learning techniques among other methods, to demonstrate that using client information may serve to improve the observability of a distributed system. Properly including client-side information proved to be an interesting and challenging research effort. We believe that our work contributed to advance the current state-ofart in distributed system monitoring. The client has viable information that eludes administrators and provides important insights on the system.
Desde os sistemas críticos ao entretenimento, a maioria dos sistemas computacionais tornou-se distribuída. Quando comparados a aplicações monolíticas, os sistemas distribu ídos são mais complexos, difíceis de operar e manter, aumentando assim a probabilidade de anomalias. A monitoria de um sistema distribuído é desta forma ainda mais importante. Todavia, obter uma imagem completa do sistema é uma tarefa árdua para os administradores, que frequentemente precisam de recorrer a uma grande variedade de ferramentas. Mesmo com a superabundância de ferramentas, a pessoa que muitas vezes identi ca a degradação ou a interrupção do sistema é a mesma que de alguma forma é desconsiderada no uxo de monitoria: o cliente. Quase diariamente, temos exemplos na comunicação social de empresas que tiveram interrupções ou degradação no serviço prestado percebido pelo cliente nal, com impacto direto nas receitas e na imagem dessas empresas. A falta de monitoria do ponto de vista do cliente e a oportunidade de melhorar a monitoria atual abriram o caminho para a questão chave de pesquisa nesta tese. Argumentamos que o cliente possui informação sobre o sistema distribuído que as ferramentas de monitora devem usar para melhorar o desempenho e resiliência. Neste trabalho pretendemos avaliar os limites de uma monitoria do lado do cliente de uma forma caixa-negra , e extender as soluções de caixa-branca com informação do cliente. Além disso, estamos também interessados em entender que tipo de informação é que o sistema escapa para o cliente. Para avaliar esta abordagem, recorremos a várias experiências em cenários distintos desde sites de três camadas até arquiteturas de micro serviços, onde tentamos identi- car problemas do ponto de vista do cliente. Usámos técnicas de criação de pro ling do ponto de vista do cliente, técnicas de Machine Learning, entre outros métodos, para demonstrar que o uso de informações do cliente pode servir para melhorar a observabilidade de um sistema distribuído. A inclusão de informações do cliente provou ser um tópico de pesquisa interessante e desa ador. Acreditamos que o nosso trabalho contribuiu para avançar o atual estado da arte de monitoria em sistemas distribuídos. O cliente possui informações viáveis que escapam ao controlo dos administradores e fornece conhecimento importante sobre o sistema.
Altice Labs
Книги з теми "White-box Analysis"
McCleary, Richard, David McDowall, and Bradley J. Bartos. Noise Modeling. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190661557.003.0003.
Повний текст джерелаЧастини книг з теми "White-box Analysis"
Formal, Thibault, Benjamin Piwowarski, and Stéphane Clinchant. "A White Box Analysis of ColBERT." In Lecture Notes in Computer Science, 257–63. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72240-1_23.
Повний текст джерелаDottax, Emmanuelle, Christophe Giraud, and Agathe Houzelot. "White-Box ECDSA: Challenges and Existing Solutions." In Constructive Side-Channel Analysis and Secure Design, 184–201. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89915-8_9.
Повний текст джерелаZeyad, Mohamed, Houssem Maghrebi, Davide Alessio, and Boris Batteux. "Another Look on Bucketing Attack to Defeat White-Box Implementations." In Constructive Side-Channel Analysis and Secure Design, 99–117. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16350-1_7.
Повний текст джерелаKlemsa, Jakub, and Martin Novotný. "Exploiting Linearity in White-Box AES with Differential Computation Analysis." In Advances in Intelligent Systems and Computing, 404–19. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52243-8_29.
Повний текст джерелаBaranová, Zuzana, and Petr Ročkai. "Compiling C and C++ Programs for Dynamic White-Box Analysis." In Lecture Notes in Computer Science, 30–45. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54994-7_4.
Повний текст джерелаBos, Joppe W., Charles Hubain, Wil Michiels, and Philippe Teuwen. "Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough." In Lecture Notes in Computer Science, 215–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53140-2_11.
Повний текст джерелаHa, Trung, Tran Khanh Dang, and Nhan Nguyen-Tan. "Comprehensive Analysis of Privacy in Black-Box and White-Box Inference Attacks Against Generative Adversarial Network." In Future Data and Security Engineering, 323–37. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91387-8_21.
Повний текст джерелаAlpirez Bock, Estuardo, and Alexander Treff. "Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge." In Constructive Side-Channel Analysis and Secure Design, 123–46. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68773-1_7.
Повний текст джерелаTang, Yufeng, Zheng Gong, Tao Sun, Jinhai Chen, and Fan Zhang. "Adaptive Side-Channel Analysis Model and Its Applications to White-Box Block Cipher Implementations." In Information Security and Cryptology, 399–417. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88323-2_22.
Повний текст джерелаBharath Kumar, D. P., Nanda Kumar, Snofy D. Dunston, and V. Mary Anita Rajam. "Analysis of the Impact of White Box Adversarial Attacks in ResNet While Classifying Retinal Fundus Images." In IFIP Advances in Information and Communication Technology, 162–75. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16364-7_13.
Повний текст джерелаТези доповідей конференцій з теми "White-box Analysis"
Liu, Zechao, Xuan Wang, Lei Cui, Zoe L. Jiang, and Chunkai Zhang. "White-box traceable dynamic attribute based encryption." In 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC). IEEE, 2017. http://dx.doi.org/10.1109/spac.2017.8304334.
Повний текст джерелаLuo, Rui, Xuejia Lai, and Rong You. "A new attempt of white-box AES implementation." In 2014 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC). IEEE, 2014. http://dx.doi.org/10.1109/spac.2014.6982727.
Повний текст джерелаZhang, Lingfeng, Yueling Zhang, and Min Zhang. "Efficient white-box fairness testing through gradient search." In ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3460319.3464820.
Повний текст джерелаFraser, Gordon, Matt Staats, Phil McMinn, Andrea Arcuri, and Frank Padberg. "Does automated white-box test generation really help software testers?" In ISSTA '13: Iitsnternational Symposium on Software Testing and Analysis. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2483760.2483774.
Повний текст джерелаBalasubramaniam, Jayalakshmi, and Philip W. L. Fong. "A white-box policy analysis and its efficient implementation." In the 18th ACM symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2462410.2462416.
Повний текст джерелаLi, Bo, and Lichen Zhang. "Analysis of white box test of cyber-physical system." In MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I: 1st International Conference on Materials Science, Energy Technology, Power Engineering (MEP 2017). Author(s), 2017. http://dx.doi.org/10.1063/1.4982548.
Повний текст джерелаReiter, Sebastian, Alexander Viehl, Oliver Bringmann, and Wolfgang Rosenstiel. "White-Box Error Effect Simulation for Assisted Safety Analysis." In 2015 Euromicro Conference on Digital System Design (DSD). IEEE, 2015. http://dx.doi.org/10.1109/dsd.2015.83.
Повний текст джерелаZhang, Zhiqiang, Tianyong Wu, and Jian Zhang. "Boundary value analysis in automatic white-box test generation." In 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2015. http://dx.doi.org/10.1109/issre.2015.7381817.
Повний текст джерелаShan, Songqing, and G. Gary Wang. "Turning Black-Box Into White Functions." In ASME 2010 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/detc2010-28958.
Повний текст джерелаViehl, A., M. Pressler, O. Bringmann, and W. Rosenstiel. "White box performance analysis considering static non-preemptive software scheduling." In 2009 Design, Automation & Test in Europe Conference & Exhibition (DATE'09). IEEE, 2009. http://dx.doi.org/10.1109/date.2009.5090718.
Повний текст джерела