Systems analysis

Results: 12418



#Item
51A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers Shohreh Sharif Mansouri and Elena Dubrova Department of Electronic Systems, School of ICT KTH - Royal Institute of Technology, Stockholm Email:

A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers Shohreh Sharif Mansouri and Elena Dubrova Department of Electronic Systems, School of ICT KTH - Royal Institute of Technology, Stockholm Email:

Add to Reading List

Source URL: skew2011.mat.dtu.dk

Language: English - Date: 2011-02-04 06:56:56
    52SMT-Based Analysis of Virtually Synchronous Distributed Hybrid Systems∗ Kyungmin Bae Peter Csaba Ölveczky

    SMT-Based Analysis of Virtually Synchronous Distributed Hybrid Systems∗ Kyungmin Bae Peter Csaba Ölveczky

    Add to Reading List

    Source URL: scungao.github.io

    Language: English - Date: 2018-08-09 17:19:27
      531  12th IAPR International Workshop on Document Analysis Systems DAS 2016 Program at a Glance

      1 12th IAPR International Workshop on Document Analysis Systems DAS 2016 Program at a Glance

      Add to Reading List

      Source URL: www.primaresearch.org

      Language: English - Date: 2016-04-01 10:37:30
        54Hyper-spectral camera system:- acquisition and analysis. Gavin Brelstaff+, Alejandro Párraga, Tom Troscianko & Derek Carr Perceptual Systems Research Centre, Dept of Psychology, 8 Woodland Rd, University of Bristol, BS8

        Hyper-spectral camera system:- acquisition and analysis. Gavin Brelstaff+, Alejandro Párraga, Tom Troscianko & Derek Carr Perceptual Systems Research Centre, Dept of Psychology, 8 Woodland Rd, University of Bristol, BS8

        Add to Reading List

        Source URL: www.cvc.uab.es

        Language: English - Date: 2001-10-22 12:02:50
          55Forensic analysis of home automation systems Thomas Mundt1 , Andreas D¨ahn1 , and Hans-Walter Glock2 1 2

          Forensic analysis of home automation systems Thomas Mundt1 , Andreas D¨ahn1 , and Hans-Walter Glock2 1 2

          Add to Reading List

          Source URL: www.petsymposium.org

          Language: English - Date: 2014-06-27 06:43:31
            56Complex Trait Consortium, 2004 Jepsen KJ SYSTEMS ANALYSIS OF BONE FRAGILITY Jepsen KJ1, Nadeau JH2 Department of Orthopaedics, Mount Sinai School of Medicine, New York, NY USA 2

            Complex Trait Consortium, 2004 Jepsen KJ SYSTEMS ANALYSIS OF BONE FRAGILITY Jepsen KJ1, Nadeau JH2 Department of Orthopaedics, Mount Sinai School of Medicine, New York, NY USA 2

            Add to Reading List

            Source URL: www.complextrait.org

            Language: English - Date: 2004-07-21 15:15:28
              57DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

              DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

              Add to Reading List

              Source URL: people.cs.vt.edu

              Language: English - Date: 2018-04-09 14:09:44
                58Int. J. Inf. Secur. DOIs10207REGULAR CONTRIBUTION  Analysis of privacy in mobile telephony systems

                Int. J. Inf. Secur. DOIs10207REGULAR CONTRIBUTION Analysis of privacy in mobile telephony systems

                Add to Reading List

                Source URL: www.cs.bham.ac.uk

                Language: English - Date: 2016-07-08 05:39:05
                  59Compiler-Driven Error Analysis for Designing Approximate Accelerators Jorge Castro-God´ınez1,2 , Sven Esser1 , Muhammad Shafique3 , Santiago Pagani1,4 , J¨org Henkel1 1  Chair for Embedded Systems (CES), Karlsruhe Ins

                  Compiler-Driven Error Analysis for Designing Approximate Accelerators Jorge Castro-God´ınez1,2 , Sven Esser1 , Muhammad Shafique3 , Santiago Pagani1,4 , J¨org Henkel1 1 Chair for Embedded Systems (CES), Karlsruhe Ins

                  Add to Reading List

                  Source URL: cesweb.itec.kit.edu

                  Language: English - Date: 2018-02-06 08:22:56
                    60Int. J. Inf. Secur. DOIs10207REGULAR CONTRIBUTION  Analysis of privacy in mobile telephony systems

                    Int. J. Inf. Secur. DOIs10207REGULAR CONTRIBUTION Analysis of privacy in mobile telephony systems

                    Add to Reading List

                    Source URL: www.cs.bham.ac.uk.

                    Language: English - Date: 2016-07-08 05:39:05