...
首页> 外文期刊>International Journal of Computer Science and Technology >A Game-theoretical Method of the Interactions Among the Nodes Violating the Timing Channel to Obtain Resilience to Jamming Attacks
【24h】

A Game-theoretical Method of the Interactions Among the Nodes Violating the Timing Channel to Obtain Resilience to Jamming Attacks

机译:节点之间的交互行为的一种博弈论方法,违反了时序通道以获得抗干扰能力

获取原文
           

摘要

Software vulnerability is the main cause of computer security problems and software vulnerability detection is a research hotspot recently. A lot of research has already been done regarding detection techniques, models, tools and all of them are covered in literatures. The main purpose of this paper is to provide a comprehensive survey and analysis of past and current research directions, including static analysis, fuzzing, taint analysis, symbolic execution and hybrid methods. Besides, this paper also provides an analysis and comparison of different tools and talks about the future direction of this field.IJCST/73/1/A-072216A Framework on Hand Gesture Recognition Using Fuzzy-Logic with Backpropagation Neural Network AlgorithmAbhishek Patil, Kanchan Pathak, Saurabh Tagalpallewar, Tejas Bharambe
机译:软件漏洞是计算机安全问题的主要原因,软件漏洞检测是最近的研究热点。关于检测技术,模型,工具的大量研究已经完成,所有这些都在文献中涵盖。本文的主要目的是提供对过去和当前研究方向的全面调查和分析,包括静态分析,模糊测试,污点分析,符号执行和混合方法。此外,本文还提供了对不同工具的分析和比较,并讨论了该领域的未来方向。IJCST/ 73/1 / A-072216A基于模糊逻辑和反向传播神经网络算法的手势识别框架Abhishek Patil,Kanchan Pathak ,Saurabh Tagalpallewar,Tejas Bharambe

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号