Výsledky vyhledávání - "Language-based Information Flow Security"
-
1
Autoři:
Zdroj: Acta Informatica Pragensia, Vol 13, Iss 3, Pp 340-358 (2024)
Témata: Computer Networks and Communications, routing protocol for low power and lossy networks, security, 7. Clean energy, Characterization and Detection of Android Malware, Artificial Intelligence, Computer security, blocking techniques, Side-Channel Attacks, FOS: Mathematics, Cache Attacks, Language-based Information Flow Security, DDoS Attacks, lln, QA75.5-76.95, internet of things, Computer science, Network Security, Rank (graph theory), Combinatorics, Electronic computers. Computer science, Signal Processing, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Botnet Detection, Mathematics
Přístupová URL adresa: https://doaj.org/article/75ddb5b014fa43ba9d1e92c3478364d2
-
2
Autoři: a další
Přispěvatelé: a další
Zdroj: Proceedings of the 3rd Eclipse Security, AI, Architecture and Modelling Conference on Cloud to Edge Continuum. :39-48
Témata: FOS: Computer and information sciences, Developmental psychology, Knowledge management, FOS: Political science, MEDLINE, Resource (disambiguation), FOS: Law, Cloud Computing and Big Data Technologies, Security Challenges in Cloud Computing, Data science, Software Diversity, Artificial Intelligence, Cloud computing, Psychology, Business, Political science, Order (exchange), Language-based Information Flow Security, Computer network, Grey literature, Maturity (psychological), 113 Computer and information sciences, Computer science, Process (computing), FOS: Psychology, Operating system, Computer Science, Physical Sciences, Process management, Law, Finance, Information Systems
Popis souboru: fulltext
Přístupová URL adresa: https://trepo.tuni.fi/handle/10024/153422
-
3
Autoři: a další
Zdroj: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. :919-933
Témata: FOS: Computer and information sciences, Economics, Materials Science, Set (abstract data type), Security Challenges in Cloud Computing, Anxiety, Microbiology, Isolation (microbiology), Artificial Intelligence, Materials Chemistry, Psychology, Hardware Security, Memory Protection, Emulation, Embedded system, Biology, Economic growth, Language-based Information Flow Security, Diamond Nanotechnology and Applications, Code (set theory), Psychiatry, Attack surface, Computer science, Panic, Memory address, Programming language, FOS: Psychology, Operating system, Cache, Semiconductor memory, FOS: Biological sciences, Computer Science, Physical Sciences, Information Systems
-
4
Autoři: a další
Zdroj: Wireless Networks. 30:6399-6426
Témata: FOS: Computer and information sciences, 02 engineering and technology, Nursing, Security Challenges in Cloud Computing, Database security, FOS: Health sciences, Computer science, Software Diversity, Database, Safeguarding, Characterization and Detection of Android Malware, Artificial Intelligence, Computer security, Computer Science, Physical Sciences, Signal Processing, 0202 electrical engineering, electronic engineering, information engineering, Remote Data Checking, Security Analysis, Medicine, Information Systems, Language-based Information Flow Security
-
5
Autoři: a další
Zdroj: IEEE Access, Vol 11, Pp 73599-73612 (2023)
Témata: Thread (computing), Computer Networks and Communications, Software quality, Software Diversity, Parallel Computing, Artificial Intelligence, Concurrency, Parallel Computing and Performance Optimization, Multi-threaded issues, Language-based Information Flow Security, Software engineering, Performance Optimization, Software development, Simulation Platforms, memory issues, dynamic instrumentation, Computer science, TK1-9971, Benchmarking, Operating system, Hardware and Architecture, 13. Climate action, Log Analysis and System Performance Diagnosis, Computer Science, Physical Sciences, Debugging, Electrical engineering. Electronics. Nuclear engineering, Software
Přístupová URL adresa: https://doaj.org/article/dde6018dfba14534b231f616312413bd
-
6
Autoři:
Zdroj: Computer Systems Science and Engineering. 44:929-943
Témata: FOS: Computer and information sciences, Secure Multi-party Computation, Parallel computing, Virtual memory, 02 engineering and technology, Security Challenges in Cloud Computing, 7. Clean energy, Page, 12. Responsible consumption, Data deduplication, Shared memory, Artificial Intelligence, Virtualization, 11. Sustainability, 0202 electrical engineering, electronic engineering, information engineering, Memory Protection, Language-based Information Flow Security, Memory map, Data diffusion machine, Advanced Cryptographic Schemes and Protocols, Deduplication, Computer science, Operating system, Semiconductor memory, Computer Science, Physical Sciences, Homomorphic Encryption, Memory management, Information Systems
-
7
Autoři:
Zdroj: Intelligent Automation & Soft Computing. 35:1565-1580
Témata: FOS: Computer and information sciences, 02 engineering and technology, Security Challenges in Cloud Computing, Malware, 7. Clean energy, Characterization and Detection of Android Malware, Adversary, Server, Artificial Intelligence, Virtualization, Computer security, Side-Channel Attacks, 0202 electrical engineering, electronic engineering, information engineering, Cache Attacks, Cloud computing, Language-based Information Flow Security, Computer network, 9. Industry and infrastructure, Cloud Computing, Computer science, Virtual machine, Distributed computing, 3. Good health, Operating system, Computer Science, Physical Sciences, Signal Processing, Remote Data Checking, Information Systems
-
8
Autoři: a další
Zdroj: Lecture Notes in Computer Science ISBN: 9783031572456
Témata: FOS: Computer and information sciences, Artificial Intelligence, Computer Science, Physical Sciences, QoS-Aware Web Services Composition and Semantic Matching, HOL, Program Analysis and Verification Techniques, Computer science, Language-based Information Flow Security, Information Systems, Programming language
-
9
Autoři:
Zdroj: Mathematical Structures in Computer Science
Témata: Høyere kategoriteori, Geometry, Hoare logic, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, Description Logics, VDP::Mathematics and natural scienses: 400, Artificial Intelligence, Logic Programming and Knowledge Representation, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Axiom, VDP::Matematikk og naturvitenskap: 400, Language-based Information Flow Security, Denotational semantics, Separation logic, Algebra over a field, Axiomatic semantics, Pure mathematics, Semantics (computer science), Computer science, Higher category theory, Programming language, Matematikk og naturvitenskap: 400 [VDP], Mathematics and natural scienses: 400 [VDP], Hoare logikk, Mathematical logic, Computer Science, Physical Sciences, Operational semantics, Matematisk logikk, Program Analysis and Verification Techniques, Correctness, Mathematics
Popis souboru: application/pdf
Přístupová URL adresa: https://hdl.handle.net/11250/3049711
-
10
Autoři:
Zdroj: Multimedia Tools and Applications. 81:9989-10005
Témata: Encryption, Structural engineering, Node (physics), 02 engineering and technology, 7. Clean energy, Real-time computing, Engineering, Characterization and Detection of Android Malware, SCADA Systems, Artificial Intelligence, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, SCADA, Embedded system, Language-based Information Flow Security, 2. Zero hunger, Computer network, 4. Education, Security Challenges in Smart Grid Systems, Computer science, RSS, Operating system, Control and Systems Engineering, Electrical engineering, Physical Sciences, Signal Processing, Computer Science, Software
Přístupová URL adresa: https://link.springer.com/content/pdf/10.1007/s11042-022-12130-9.pdf
-
11
Autoři: a další
Zdroj: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 2 (2021)
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2Témata: Parallel computing, Computer engineering. Computer hardware, Template Matching, Curve25519, Encryption, Lattice Reduction, Information technology, Branch predictor, 02 engineering and technology, IC Reverse Engineering, Mathematical analysis, 01 natural sciences, ECDSA P-256, TK7885-7895, Microarchitectural Attack, Machine Learning Attacks, Data processing, computer science, Hardware Security and Authentication Techniques, Cryptanalysis of Block Ciphers and Hash Functions, Return Address Stack, Artificial Intelligence, Computer security, Elliptic Curve Digital Signature Algorithm, Side-Channel Attacks, Elliptic curve, OpenSSL ECC scalar multiplication, 0103 physical sciences, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Scan-Based Side-Channel Attacks, Language-based Information Flow Security, Computer network, Side channel attack, Public-key cryptography, T58.5-58.64, Computer science, Elliptic curve cryptography, Hardware and Architecture, Computer Science, Physical Sciences, Cryptography, Security Analysis, Scalar multiplication, Mathematics
Popis souboru: application/application/pdf
Přístupová URL adresa: https://tches.iacr.org/index.php/TCHES/article/download/8795/8395
https://doaj.org/article/f6bf718fdc6642b6a78c9fa54273da00
https://dblp.uni-trier.de/db/journals/tches/tches2021.html#ChakrabortyBAPM21
https://doi.org/10.46586/tches.v2021.i2.275-303
https://www.research-collection.ethz.ch/handle/20.500.11850/460069
http://hdl.handle.net/20.500.11850/522749
http://hdl.handle.net/20.500.11850/460069 -
12
Autoři:
Zdroj: Engineering, Technology & Applied Science Research. 11:6719-6723
Témata: Aspect-oriented programming, Executable, Set (abstract data type), Cryptographic primitive, 02 engineering and technology, Cryptographic protocol, Characterization and Detection of Android Malware, Hardware Security and Authentication Techniques, Artificial Intelligence, SystemC, 0202 electrical engineering, electronic engineering, information engineering, Embedded system, Language-based Information Flow Security, Code (set theory), Transaction-level modeling, Electronic system-level design and verification, Computer science, Programming language, Algorithm, Advanced Encryption Standard, Hardware and Architecture, Signal Processing, Computer Science, Physical Sciences, Cryptography, Security Analysis, Logic Encryption, Software
-
13
Autoři: a další
Zdroj: IEEE Access, Vol 9, Pp 10378-10391 (2021)
Témata: input validation, FOS: Computer and information sciences, SQL Injection, Computer Networks and Communications, 02 engineering and technology, Web Application Security and Vulnerability Detection, Security Testing, Filter (signal processing), Artificial Intelligence, Computer security, 0202 electrical engineering, electronic engineering, information engineering, sanitization, Language-based Information Flow Security, software security, Information security, Computer science, TK1-9971, Intrusion Detection, Computer Science, Physical Sciences, regular expression, Network Intrusion Detection and Defense Mechanisms, Web Application, Computer vision, Electrical engineering. Electronics. Nuclear engineering, Information Systems, Penetration Testing
Přístupová URL adresa: https://ieeexplore.ieee.org/ielx7/6287639/9312710/09319139.pdf
https://doaj.org/article/62d362566d4443efb10496c067d42264
https://ieeexplore.ieee.org/document/9319139
https://reunir.unir.net/handle/123456789/11266
https://dblp.uni-trier.de/db/journals/access/access9.html#Ibarra-FiallosH21 -
14
Autoři: a další
Zdroj: IEEE Access, Vol 9, Pp 80953-80969 (2021)
Témata: FOS: Computer and information sciences, IoT Security, Computer Networks and Communications, Internet of Things, Resource (disambiguation), Trusted Execution Environment, Fog Computing, 02 engineering and technology, Security Challenges in Cloud Computing, Data science, Artificial Intelligence, Computer security, Intel SGX, ARM TrustZone, 0202 electrical engineering, electronic engineering, information engineering, Edge Computing, Cloud computing, data security, Language-based Information Flow Security, Computer network, Internet of Things and Edge Computing, trusted execution environments, Trusted computing, Computer science, TK1-9971, Mobile Edge Computing, Operating system, Computer Science, Physical Sciences, Electrical engineering. Electronics. Nuclear engineering, Information Systems
Přístupová URL adresa: https://ieeexplore.ieee.org/ielx7/6287639/9312710/09445012.pdf
https://doaj.org/article/38c54639fa1745ea87398d6d193dbee4
https://dblp.uni-trier.de/db/journals/access/access9.html#ValadaresWCPPG21
https://ieeexplore.ieee.org/document/9445012/
https://doi.org/10.1109/ACCESS.2021.3085524 -
15
Autoři:
Zdroj: IEEE Access, Vol 9, Pp 118406-118418 (2021)
Témata: Exploit, cybersecurity, IoT Security, Computer Networks and Communications, Internet of Things, Structural engineering, Node (physics), 02 engineering and technology, Quantum mechanics, Reliability engineering, Unavailability, Characterization and Detection of Android Malware, Engineering, framework, Artificial Intelligence, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Language-based Information Flow Security, DDoS Attacks, Computer network, Software engineering, Physics, System administrator, Power (physics), Computer science, Distributed computing, TK1-9971, Intrusion Detection, Overhead (engineering), Operability, Operating system, Moving target defense, Reliability (semiconductor), Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, Electrical engineering. Electronics. Nuclear engineering, Default gateway, The Internet
-
16
Autoři:
Zdroj: Lecture Notes in Computer Science ISBN: 9783031308222
Témata: Mathematical proof, Usability, Runtime Verification, Geometry, Model Checking, 12. Responsible consumption, Safety Verification, Theoretical computer science, Artificial Intelligence, Automated theorem proving, FOS: Mathematics, HOL, Proof assistant, Language-based Information Flow Security, Gas meter prover, Computer science, Programming language, Operating system, Computational Theory and Mathematics, Automated proof checking, Computer Science, Physical Sciences, Proof complexity, Program Analysis and Verification Techniques, Correctness, Mathematics, Formal Methods in Software Verification and Control
-
17
Autoři:
Zdroj: Lecture Notes in Computer Science ISBN: 9783031384981
Témata: Rewriting, 4. Education, Confluence, Discrete mathematics, Computer science, 7. Clean energy, Programming language, Algorithm, Satisfiability Modulo Theories, Theoretical computer science, Computational Theory and Mathematics, Artificial Intelligence, Computer Science, Physical Sciences, FOS: Mathematics, Modulo, Program Analysis and Verification Techniques, Mathematics, Formal Methods in Software Verification and Control, Language-based Information Flow Security
-
18
Autoři: a další
Témata: FOS: Computer and information sciences, Secure Multi-party Computation, Replay attack, Encryption, Security Challenges in Cloud Computing, Hypervisor, 7. Clean energy, Password, Artificial Intelligence, Virtualization, Computer security, Side-Channel Attacks, Cache Attacks, Cloud computing, Spoofing attack, Language-based Information Flow Security, Computer network, Advanced Cryptographic Schemes and Protocols, 9. Industry and infrastructure, Side channel attack, Cloud Computing, Computer science, Virtual machine, 3. Good health, Operating system, Cache, Computer Science, Physical Sciences, Cryptography, Information Systems
-
19
Autoři: a další
Témata: Artificial intelligence, Backdoor, Computer Networks and Communications, Trojan, Geometry, Set (abstract data type), Adversarial system, Malware, Quantum mechanics, Characterization and Detection of Android Malware, Artificial Intelligence, Computer security, State (computer science), FOS: Mathematics, Generator (circuit theory), Embedded system, Language-based Information Flow Security, Code (set theory), Signature (topology), Network packet, Physics, Power (physics), Computer science, Payload (computing), Intrusion Detection, Programming language, 3. Good health, Signal Processing, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Mathematics
-
20
Autoři: a další
Zdroj: International Journal on Software Tools for Technology Transfer. 23:71-88
Témata: IoT Security, Computer Networks and Communications, Internet of Things, IoT, Internet of Things, static analysis, 02 engineering and technology, Secure coding, Characterization and Detection of Android Malware, Rural Digital Europe, Artificial Intelligence, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Language-based Information Flow Security, Extension (predicate logic), Information security, Software security assurance, Static analysis, Computer science, Intrusion Detection, Programming language, EUTOPIA Alliance, Security service, Signal Processing, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Security Analysis, Botnet Detection, Software, Information Systems
Popis souboru: application/pdf
Přístupová URL adresa: https://link.springer.com/content/pdf/10.1007/s10009-020-00592-x.pdf
https://link.springer.com/content/pdf/10.1007/s10009-020-00592-x.pdf
https://dblp.uni-trier.de/db/journals/sttt/sttt23.html#FerraraMCS21
https://doi.org/10.1007/s10009-020-00592-x
https://link.springer.com/article/10.1007/s10009-020-00592-x
https://iris.unive.it/handle/10278/3734701
https://iris.univr.it/handle/11562/1031436
https://www.openaccessrepository.it/record/80061
Nájsť tento článok vo Web of Science
Full Text Finder