Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
    • by  and +1
    •   7  
      VulnerabilityFirewallResearch PaperThreat
Masalah keamanan system penyedia informasi menjadi salah satu aspek penting dari sebuah sistem informasi. Sayang sekali masalah keamanan ini sering kali kurang mendapat perhatian dari para pemilik dan pengelola sistem informasi.... more
    • by 
    •   3  
      Network SecuritySPYWAREBackdoor
Hardware components can contain hidden backdoors, which can be enabled with catastrophic effects or for ill-gotten profit. These backdoors can be inserted by a malicious insider on the design team or a third-party IP provider. In this... more
    • by 
    •   6  
      Computer ScienceComputer EngineeringHardware SecurityHardware Trojan
Model memori Java menentukan bagaimana dan kapan thread yang berbeda dapat melihat nilai-nilai yang ditulis di variabel bersama oleh thread lain, dan bagaimana cara mensinkronisasi akses ke variabel bersama bila diperlukan. Model memori... more
    • by 
    •   2  
      BackdoorDetecting Backdoor Using Stepping Stone Detection Approach
Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. SYN Flooding is a type of DoS which is harmful to... more
    • by  and +1
    •   12  
      Distributed ComputingNetwork SecurityDistributed Denial of Service AttackHidden Markov Models
AI Security researchers have identified a new way crowdsourced data can be intentionally compromised. Backdoor attacks are a process through which an adversary creates a vulnerability in a machine learning model by ?poisoning?' the... more
    • by  and +3
    •   2  
      HCIBackdoor
    • by 
    •   6  
      Network SecurityDistributed Denial of Service AttackSPAMBackdoor
Biometric data, such as face images, are often associated with sensitive information (e.g medical, financial, personal government records). Hence, a data breach in a system storing such information can have devastating consequences. Deep... more
    • by 
    •   4  
      Computer ScienceBiometricsComputer SecurityBackdoor
    • by 
    •   17  
      Computer ScienceDistributed ComputingNetwork SecurityDistributed Denial of Service Attack
Abstract:-Stepping Stone Detection (SSD) is conventionally intended for the detection of series of host computers used by attackers to hide their track in a network or host environment. This paper discusses the evolution of SSD and... more
    • by 
    •   6  
      Network SecurityDistributed Denial of Service AttackSPAMBackdoor