Results 261 to 270 of about 158,430 (308)
Some of the next articles are maybe not open access.
2016
This chapter is meant to provide a transition from the theoretical aspects of security testing to the hands-on hacking. The following sections will explain different technical approaches to security testing that will result in a well-structured report.
openaire +1 more source
This chapter is meant to provide a transition from the theoretical aspects of security testing to the hands-on hacking. The following sections will explain different technical approaches to security testing that will result in a well-structured report.
openaire +1 more source
2007
As security remains a major concern in more and more application, security of internal IP with scan chain access is fast becoming a major concern in certain parts of the electronics industry. High quality end-production testing must complete Design For Security (DFS) techniques in order not to deliver supposedly secure chips that may fail due to ...
Flottes, Marie-Lise +3 more
openaire +1 more source
As security remains a major concern in more and more application, security of internal IP with scan chain access is fast becoming a major concern in certain parts of the electronics industry. High quality end-production testing must complete Design For Security (DFS) techniques in order not to deliver supposedly secure chips that may fail due to ...
Flottes, Marie-Lise +3 more
openaire +1 more source
2011
Test interfaces are present in nearly all digital hardware. In many cases, the security of the system depends on the security of the test interfaces. Systems have been hacked in the field using test interfaces as an avenue for attack. Researchers in industry and academia have developed defenses over the past 20 years.
Kurt Rosenfeld, Ramesh Karri
openaire +1 more source
Test interfaces are present in nearly all digital hardware. In many cases, the security of the system depends on the security of the test interfaces. Systems have been hacked in the field using test interfaces as an avenue for attack. Researchers in industry and academia have developed defenses over the past 20 years.
Kurt Rosenfeld, Ramesh Karri
openaire +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
2009
Funktionale Sicherheits- Tests können verwendet werden um sicherzustellen, dass die spezifizierte Sicherheitsfunktionalität korrekt funktioniert. Dabei liegt der Fokus nicht auf einem bösartigen Angriff auf das System, sondern auf der Erkenntnis, dass bestimmten Funktionen und Mechanismen vertraut werden kann.
openaire +1 more source
Funktionale Sicherheits- Tests können verwendet werden um sicherzustellen, dass die spezifizierte Sicherheitsfunktionalität korrekt funktioniert. Dabei liegt der Fokus nicht auf einem bösartigen Angriff auf das System, sondern auf der Erkenntnis, dass bestimmten Funktionen und Mechanismen vertraut werden kann.
openaire +1 more source
Nano-enabled pesticides for sustainable agriculture and global food security
Nature Nanotechnology, 2022Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly
Circularly polarized lanthanide luminescence for advanced security inks
Nature Reviews Chemistry, 2020Lewis Edward MacKenzie, Robert Pal
exaly

