军事学 >>> 军事学
搜索结果: 1-5 共查到军事学 exploitation相关记录5条 . 查询时间(0.252 秒)
Near-field microprobes have the capability to isolate small regions of a chip surface and enable precise measurements with high spatial resolution. Being able to distinguish the activity of small regi...
How to securely run untrusted software? A typical answer is to try to isolate the actual effects this software might have. Such counter-measures can take the form of memory segmentation, sandboxing ...
Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is usually assumed that one has a full knowledge of the targeted crypto devices and thus be well capa...
We discuss the first power and timing side channels on Strong Physical Unclonable Functions (Strong PUFs) in the literature, and describe their efficient exploitation via adapted machine learning (ML)...
[美国《防务世界》2006年6月5日报道] BAE系统公司SOCET GXP(TM)软件新版本中增加了图像分析、地理空间分析,3D仿真和目标获取等功能,这些功能可有效应用于本土防御和军队情报任务中,比如灾难救济和恢复、人道主义救援、侦察、战斗毁伤评估和监视任务等。

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...