[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Irolla, 2018 - Google Patents

Formalization of Neural Network Applications to Secure 3D Mobile Applications

Irolla, 2018

View PDF
Document ID
15557529307206601961
Author
Irolla P
Publication year

External Links

Snippet

This thesis work is part of the 3D NeuroSecure project. It is an investment project, that aims to develop a secure collaborative solution for therapeutic innovation using high performance processing (HPC) technology to the biomedical world. This solution will give the opportunity …
Continue reading at theses.hal.science (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Hossain et al. {Dependence-Preserving} data compaction for scalable forensic analysis
Wei et al. Deep ground truth analysis of current android malware
Heartfield et al. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Reedy Interpol review of digital evidence 2016-2019
US9582668B2 (en) Quantifying the risks of applications for mobile devices
Abawajy et al. Identifying cyber threats to mobile-IoT applications in edge computing paradigm
Dunham et al. Android malware and analysis
Sood et al. Targeted cyber attacks: multi-staged attacks driven by exploits and malware
Ahmed Automated analysis approach for the detection of high survivable ransomwares
Sasi et al. A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Kafle et al. Security in centralized data store-based home automation platforms: A systematic analysis of nest and hue
Sun et al. Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
Tanabe et al. Evasive malware via identifier implanting
Scalas et al. Explanation-driven characterization of android ransomware
Belous et al. Computer viruses, malicious logic, and spyware
Gupta et al. Developing a blockchain-based and distributed database-oriented multi-malware detection engine
Irolla Formalization of Neural Network Applications to Secure 3D Mobile Applications
Moussaileb Log analysis for malicious software detection
Oberoi Androsat: Security analysis tool for android applications
Seraj Permission-based android malware detection using machine learning
Ning Analysis of the Latest Trojans on Android Operating System
Tchakounte A Malware Detection System for Android
Alexander Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study
Wapet Preventing the release of illegitimate applications on mobile markets
Faruki Techniques For Analysis And Detection Of Android Malware...