7   Artículos

 
en línea
Saqib Ali, Sana Ashraf, Muhammad Sohaib Yousaf, Shazia Riaz and Guojun Wang    
The successful outcomes of deep learning (DL) algorithms in diverse fields have prompted researchers to consider backdoor attacks on DL models to defend them in practical applications. Adversarial examples could deceive a safety-critical system, which co... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tasniem Al-Yahya, Mohamed El Bachir Abdelkrim Menai and Hassan Mathkour    
Boolean structural measures were introduced to explain the high performance of conflict-driven clause-learning (CDCL) SAT solvers on industrial SAT instances. Those considered in this study include measures related to backbones and backdoors: backbone si... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
You Guo, Hector Marco-Gisbert and Paul Keir    
A webshell is a command execution environment in the form of web pages. It is often used by attackers as a backdoor tool for web server operations. Accurately detecting webshells is of great significance to web server protection. Most security products d... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Gopal Vishwakarma and Wonjun Lee    
Nowadays, companies are heavily investing in the development of ?Internet of Things(IoT)? products. These companies usually and obviously hunt for lucrative business models. Currently, each person owns at least 3?4 devices (such as mobiles, personal comp... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »