+

Irolla, 2018 - Google Patents

Formalization of Neural Network Applications to Secure 3D Mobile Applications

Irolla, 2018

View PDF
Document ID
15557529307206601961
Author
Irolla P
Publication year

External Links

Snippet

This thesis work is part of the 3D NeuroSecure project. It is an investment project, that aims to develop a secure collaborative solution for therapeutic innovation using high performance processing (HPC) technology to the biomedical world. This solution will give the opportunity …
Continue reading at theses.hal.science (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Steffens Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
Wei et al. Deep ground truth analysis of current android malware
Heartfield et al. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
US9582668B2 (en) Quantifying the risks of applications for mobile devices
Dunham et al. Android malware and analysis
Khanmohammadi et al. Empirical study of android repackaged applications
Kafle et al. Security in centralized data store-based home automation platforms: A systematic analysis of nest and hue
Chew et al. Real-time system call-based ransomware detection
Wilson Cybersecurity
Tanabe et al. Evasive malware via identifier implanting
Tyagi et al. Artificial Intelligence for Malware Analysis: A Systematic Study
Alzahrani et al. A Survey of Ransomware Detection Methods
Siadati et al. DevPhish: Exploring social engineering in software supply chain attacks on developers
Gupta et al. Developing a blockchain-based and distributed database-oriented multi-malware detection engine
Belous et al. Computer viruses, malicious logic, and spyware
Altaha et al. A survey on android malware detection techniques using supervised machine learning
Ning Analysis of the latest trojans on Android operating system
Irolla Formalization of Neural Network Applications to Secure 3D Mobile Applications
Moussaileb Log analysis for malicious software detection
Oberoi Androsat: Security analysis tool for android applications
Seraj Permission-based android malware detection using machine learning
Alexander Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study
Tchakounté A Malware Detection System For Android
Wapet Preventing the release of illegitimate applications on mobile markets
Al-Qabalin Android Spyware Detection Using Random Forest Algorithm: A Novel Dataset
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载