Results 251 to 260 of about 462,135 (294)
Some of the next articles are maybe not open access.

The DAO attack paradoxes in propositional logic

2017 4th International Conference on Systems and Informatics (ICSAI), 2017
Blockchain is a new type of decentralized technology, causing more and more attention because of the huge number of implicit revolutionary applications in many fields, especially in the finance field. The DAO was a crowdfunding project based on blockchain. It was one of the most widely-known blockchain applications in 2016, not only because of the most
Xiangfu Zhao   +4 more
openaire   +1 more source

Heidegger’s “Attack” on Logic: The Nothing

1977
As we have seen, Heidegger contends that the history of Western metaphysics has been a record of the forgetfulness of Being. He asserts this because, although metaphysics has treated of being (das Seiende) in the sense of the ὄν ᾗ ὄν, it has not grasped Being (Sein) as truth-process, that is, as ἀλήθeια.
openaire   +1 more source

Network attack origin forensics with fuzzy logic

2015 5th International Conference on Computer and Knowledge Engineering (ICCKE), 2015
Network forensics is scientifically proven techniques to collect, detect, identify, examine, correlate, analyze, and document digital evidence from multiple sources to identify suspicious entities and stepwise actions. The overwhelming amount and low quality of output from sensors make it difficult for analysts to find the origin of the attack in ...
Maryam Rostamipour, Babak Sadeghiyan
openaire   +1 more source

A Combined Logical and Physical Attack on Logic Obfuscation

Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
Michael Zuzak   +3 more
openaire   +1 more source

Classical Cryptanalysis Attacks on Logic Locking Techniques

Journal of Electronic Testing, 2019
Logic locking is a protection technique for outsourced integrated circuit (IC) designs that thwarts IC piracy and IC counterfeiting by untrusted foundries. In this technique, the IC design house locks the correct functionality of the circuit using a key that is known only to the trusted entities in the design house.
Bodhisatwa Mazumdar   +4 more
openaire   +1 more source

Revisit sequential logic obfuscation: Attacks and defenses

2017 IEEE International Symposium on Circuits and Systems (ISCAS), 2017
The urgent requests to protection integrated circuits (IC) and hardware intellectual properties (IP) have led to the development of various logic obfuscation methods. While most existing solutions focus on the combinational logic or sequential logic with full scan-chains, in this paper, we will revisit the security of sequential logic obfuscation ...
Meade, Travis   +4 more
openaire   +2 more sources

Islamic Philosophy and the Attack on Logic

Topoi, 2000
Etude de la critique nominaliste de la logique aristotelicienne developpee par ibn Taymiyyah a partir de la notion de definition, la theorie des universaux, la nature du syllogisme et la distinction entre essence et existence. L'A. montre que la critique d'ibn Taymiyyah remet en question tous les presupposes theoriques de la philosophie islamique, des ...
openaire   +1 more source

Demonstrating Different Phishing Attacks Using Fuzzy Logic

2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018
Phishing has increased tremendously over last few years and it has become a serious threat to global security and economy. Existing literature dealing with the problem of phishing is scarce. Phishing is a deception technique that uses a combination of technology and social engineering to acquire sensitive information such as online banking passwords ...
openaire   +1 more source

Optical Probing Attack on Logic Locking

2023
Mark Tehranipoor   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy