Irolla, 2018 - Google Patents
Formalization of Neural Network Applications to Secure 3D Mobile ApplicationsIrolla, 2018
View PDF- Document ID
 - 15557529307206601961
 - Author
 - Irolla P
 - Publication year
 
External Links
Snippet
This thesis work is part of the 3D NeuroSecure project. It is an investment project, that aims  to develop a secure collaborative solution for therapeutic innovation using high performance  processing (HPC) technology to the biomedical world. This solution will give the opportunity … 
    - 230000001537 neural 0 title abstract description 36
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
 - G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
 - G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
 - G06K9/46—Extraction of features or characteristics of the image
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/577—Assessing vulnerabilities and evaluating computer system security
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Steffens | Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage | |
| Wei et al. | Deep ground truth analysis of current android malware | |
| Heartfield et al. | A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks | |
| US9582668B2 (en) | Quantifying the risks of applications for mobile devices | |
| Dunham et al. | Android malware and analysis | |
| Khanmohammadi et al. | Empirical study of android repackaged applications | |
| Kafle et al. | Security in centralized data store-based home automation platforms: A systematic analysis of nest and hue | |
| Chew et al. | Real-time system call-based ransomware detection | |
| Wilson | Cybersecurity | |
| Tanabe et al. | Evasive malware via identifier implanting | |
| Tyagi et al. | Artificial Intelligence for Malware Analysis: A Systematic Study | |
| Alzahrani et al. | A Survey of Ransomware Detection Methods | |
| Siadati et al. | DevPhish: Exploring social engineering in software supply chain attacks on developers | |
| Gupta et al. | Developing a blockchain-based and distributed database-oriented multi-malware detection engine | |
| Belous et al. | Computer viruses, malicious logic, and spyware | |
| Altaha et al. | A survey on android malware detection techniques using supervised machine learning | |
| Ning | Analysis of the latest trojans on Android operating system | |
| Irolla | Formalization of Neural Network Applications to Secure 3D Mobile Applications | |
| Moussaileb | Log analysis for malicious software detection | |
| Oberoi | Androsat: Security analysis tool for android applications | |
| Seraj | Permission-based android malware detection using machine learning | |
| Alexander | Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study | |
| Tchakounté | A Malware Detection System For Android | |
| Wapet | Preventing the release of illegitimate applications on mobile markets | |
| Al-Qabalin | Android Spyware Detection Using Random Forest Algorithm: A Novel Dataset |