|
|
|
Artyom V. Gorchakov, Liliya A. Demidova and Peter N. Sovietov
In this paper we consider the research and development of classifiers that are trained to predict the task solved by source code. Possible applications of such task detection algorithms include method name prediction, hardware?software partitioning, prog...
ver más
|
|
|
|
|
|
|
Ján Mach, Luká? Kohútka and Pavel Cicák
The shrinking of technology nodes allows higher performance, but susceptibility to soft errors increases. The protection has been implemented mainly by lockstep or hardened process techniques, which results in a lower frequency, a larger area, and higher...
ver más
|
|
|
|
|
|
|
Zhun Zhang, Xiang Wang, Qiang Hao, Dongdong Xu, Jiqing Wang, Jiakang Liu, Jinhui Ma and Jinlei Zhang
Embedded systems are increasingly applied in numerous security-sensitive applications, such as industrial controls, railway transports, intelligent vehicles, avionics and aerospace. However, embedded systems are compromised in the execution of untrusted ...
ver más
|
|
|
|
|
|
|
Won Cho and Joonho Kong
In this paper, we introduce a memory and cache contention denial-of-service attack and its hardware-based countermeasure. Our attack can significantly degrade the performance of the benign programs by hindering the shared resource accesses of the benign ...
ver más
|
|
|
|
|
|
|
Yiran Hao, Yiqiang Sheng and Jinlin Wang
We use the proposed packet2vec learning algorithm for IDS preprocessing, the basic steps of IDS are as follows. First, the originally collected traffic is split into packets to be truncated into fixed length. Next, the packet2vec learning algorithm is us...
ver más
|
|
|
|
|
|
|
Sunarno Edy Wibowo
Pág. 145 - 163
Indonesia is currently racing with time related to the increasingly rampant criminal corruption committed by state officials who have a very significant impact also on the increase of TPPU. One of the perpetrators' efforts to avoid him from the law by hi...
ver más
|
|
|
|
|
|
|
Tetiana Momot, Ihor ?oliada
Pág. 124 - 131
The subject matter of the article is conceptual and applied aspects of the implementation of the compliance control for ensuring the financial security to banking institutions. The aim of the study is the complex comprehension of conceptual and methodica...
ver más
|
|
|
|