Search results
From iis-projects
Create the page "Security" on this wiki! See also the search results found.
Page title matches
Page text matches
- ...''security needs a new hardware-software contract''' [Ge2018a], [Ge2018b]. Security is and has always been the operating system's (OS) job. For instance, memor * familiarity with basic system security principles6 KB (915 words) - 18:16, 20 May 2020
- ...nuclear material when detected at places such as border crossings or other security checkpoints. The main technological challenge of detecting fast neutrons is ...d of further development in order to find a suitable solution for in-field security applications. This is the purpose of this project. There is interest in thi5 KB (623 words) - 10:32, 5 November 2019
- ...mislabeling them during run time. It is clear that this shows the issue of security and safety in the use of DNNs in the real world applications. The student4 KB (509 words) - 15:41, 10 November 2020
- ...interference cancellation." IEEE Transactions on Information Forensics and Security 11(7), 2016, 1486-1499.5 KB (662 words) - 13:31, 10 May 2023
- ...ure ranging procedures require a microcontroller core on-chip and a set of security functions including secure storage, key generation, key exchange, encryptio ...AC layer secure ranging procedures in the IEEE 802.15.4z and elaborate the security requirements for the RISC-V core.8 KB (1,139 words) - 19:10, 29 January 2021
- [[File:5G-Security.jpg|thumb|400px|5G Security, Source: https://5g.security]]3 KB (404 words) - 10:05, 9 February 2021
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (391 words) - 08:49, 21 June 2022
- ...nowledge among multiple parties without compromising user privacy and data security.</p></li>11 KB (1,610 words) - 11:00, 14 November 2022
- [https://www.iaik.tugraz.at/ IAIK] has been active in the field of hardware security and privacy for more than 30 years and today is among the most renowned res ...itan] project where it - together with partners such as Google, G+D Mobile Security, Nuvoton Technologies, Western Digital and ETH Zürich - is building the fi6 KB (849 words) - 18:43, 23 November 2021
- ...nfigurations for higher performance (3.13 CoreMark/MHz) or with additional security features.6 KB (835 words) - 12:52, 27 April 2021
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (440 words) - 10:53, 15 November 2022
- ...ach leads to accurate classification of the streamed data, it also poses a security risk, since surveillance data is highly sensitive.3 KB (433 words) - 15:36, 4 August 2022
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]4 KB (508 words) - 18:59, 10 January 2022
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (467 words) - 13:55, 12 October 2022
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]8 KB (1,127 words) - 19:54, 1 March 2023
- category = HW/SW Safety and Security category = HW/SW Safety and Security5 KB (614 words) - 09:49, 15 January 2024
- ...resting research questions about software architecture, operating systems, security, and hardware [6]. For example, the steady move from monolithic application6 KB (905 words) - 21:41, 6 December 2021
- [[Category:HW/SW Safety and Security]]2 KB (337 words) - 08:49, 21 June 2022
- [[Category:HW/SW Safety and Security]]2 KB (348 words) - 13:16, 24 October 2023
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]4 KB (515 words) - 15:06, 5 August 2022