Irolla, 2018 - Google Patents
Formalization of Neural Network Applications to Secure 3D Mobile ApplicationsIrolla, 2018
View PDF- Document ID
- 15557529307206601961
- Author
- Irolla P
- Publication year
External Links
Snippet
This thesis work is part of the 3D NeuroSecure project. It is an investment project, that aims to develop a secure collaborative solution for therapeutic innovation using high performance processing (HPC) technology to the biomedical world. This solution will give the opportunity …
- 230000001537 neural 0 title abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hossain et al. | {Dependence-Preserving} data compaction for scalable forensic analysis | |
Wei et al. | Deep ground truth analysis of current android malware | |
Heartfield et al. | A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks | |
Reedy | Interpol review of digital evidence 2016-2019 | |
US9582668B2 (en) | Quantifying the risks of applications for mobile devices | |
Abawajy et al. | Identifying cyber threats to mobile-IoT applications in edge computing paradigm | |
Dunham et al. | Android malware and analysis | |
Sood et al. | Targeted cyber attacks: multi-staged attacks driven by exploits and malware | |
Ahmed | Automated analysis approach for the detection of high survivable ransomwares | |
Sasi et al. | A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges | |
Kafle et al. | Security in centralized data store-based home automation platforms: A systematic analysis of nest and hue | |
Sun et al. | Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service} | |
Tanabe et al. | Evasive malware via identifier implanting | |
Scalas et al. | Explanation-driven characterization of android ransomware | |
Belous et al. | Computer viruses, malicious logic, and spyware | |
Gupta et al. | Developing a blockchain-based and distributed database-oriented multi-malware detection engine | |
Irolla | Formalization of Neural Network Applications to Secure 3D Mobile Applications | |
Moussaileb | Log analysis for malicious software detection | |
Oberoi | Androsat: Security analysis tool for android applications | |
Seraj | Permission-based android malware detection using machine learning | |
Ning | Analysis of the Latest Trojans on Android Operating System | |
Tchakounte | A Malware Detection System for Android | |
Alexander | Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study | |
Wapet | Preventing the release of illegitimate applications on mobile markets | |
Faruki | Techniques For Analysis And Detection Of Android Malware... |