Results 251 to 260 of about 462,135 (294)
Some of the next articles are maybe not open access.
The DAO attack paradoxes in propositional logic
2017 4th International Conference on Systems and Informatics (ICSAI), 2017Blockchain is a new type of decentralized technology, causing more and more attention because of the huge number of implicit revolutionary applications in many fields, especially in the finance field. The DAO was a crowdfunding project based on blockchain. It was one of the most widely-known blockchain applications in 2016, not only because of the most
Xiangfu Zhao +4 more
openaire +1 more source
Heidegger’s “Attack” on Logic: The Nothing
1977As we have seen, Heidegger contends that the history of Western metaphysics has been a record of the forgetfulness of Being. He asserts this because, although metaphysics has treated of being (das Seiende) in the sense of the ὄν ᾗ ὄν, it has not grasped Being (Sein) as truth-process, that is, as ἀλήθeια.
openaire +1 more source
Network attack origin forensics with fuzzy logic
2015 5th International Conference on Computer and Knowledge Engineering (ICCKE), 2015Network forensics is scientifically proven techniques to collect, detect, identify, examine, correlate, analyze, and document digital evidence from multiple sources to identify suspicious entities and stepwise actions. The overwhelming amount and low quality of output from sensors make it difficult for analysts to find the origin of the attack in ...
Maryam Rostamipour, Babak Sadeghiyan
openaire +1 more source
A Combined Logical and Physical Attack on Logic Obfuscation
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022Michael Zuzak +3 more
openaire +1 more source
Classical Cryptanalysis Attacks on Logic Locking Techniques
Journal of Electronic Testing, 2019Logic locking is a protection technique for outsourced integrated circuit (IC) designs that thwarts IC piracy and IC counterfeiting by untrusted foundries. In this technique, the IC design house locks the correct functionality of the circuit using a key that is known only to the trusted entities in the design house.
Bodhisatwa Mazumdar +4 more
openaire +1 more source
Revisit sequential logic obfuscation: Attacks and defenses
2017 IEEE International Symposium on Circuits and Systems (ISCAS), 2017The urgent requests to protection integrated circuits (IC) and hardware intellectual properties (IP) have led to the development of various logic obfuscation methods. While most existing solutions focus on the combinational logic or sequential logic with full scan-chains, in this paper, we will revisit the security of sequential logic obfuscation ...
Meade, Travis +4 more
openaire +2 more sources
Islamic Philosophy and the Attack on Logic
Topoi, 2000Etude de la critique nominaliste de la logique aristotelicienne developpee par ibn Taymiyyah a partir de la notion de definition, la theorie des universaux, la nature du syllogisme et la distinction entre essence et existence. L'A. montre que la critique d'ibn Taymiyyah remet en question tous les presupposes theoriques de la philosophie islamique, des ...
openaire +1 more source
Demonstrating Different Phishing Attacks Using Fuzzy Logic
2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018Phishing has increased tremendously over last few years and it has become a serious threat to global security and economy. Existing literature dealing with the problem of phishing is scarce. Phishing is a deception technique that uses a combination of technology and social engineering to acquire sensitive information such as online banking passwords ...
openaire +1 more source
Detecting cyber attacks in time : combining attack simulation with detection logic
2021unknown ...
openaire +1 more source

