On Way to Simplify the Reverse Engineering of UEFI Firmwares

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACeS (1. : 2019 : George Town, Pinang) Advances in cyber security
1. Verfasser: Lebedev, Philip (VerfasserIn)
Weitere Verfasser: Kogos, Konstantin (VerfasserIn), Vasilenko, Egor (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Blockchain-Based Image Sharing Application 2020 Wong, Zhen-Kai
Performance Evaluation of Wavelet SVD-Based Watermarking Schemes for Color Images 2020 Rassem, Taha H.
On Way to Simplify the Reverse Engineering of UEFI Firmwares 2020 Lebedev, Philip
An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication 2020 Murtaza, Abid
Threats Against Information Privacy and Security in Social Networks: A Review 2020 Al-Charchafchi, Ahmed
Patterns and Colors: A Simple yet Innovative Way to Solve Pattern Tracking 2020 Joshua, Abigail Achiamma
Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment 2020 Singh, Parminder
Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms 2020 Bahashwan, Abdullah Ahmed
Comparison Between BlindLogin and Other Graphical Password Authentication Systems 2020 Ho, Yean Li
Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study 2020 Albaroodi, Hala A.
Empirical Investigations on Usability of Security Warning Dialogs: End Users Experience 2020 Ahmad, Farah Nor Aliah
A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology 2020 Muzammal, Syeda Mariam
A Survey on Privacy Concerns in Blockchain Applications and Current Blockchain Solutions to Preserve Data Privacy 2020 Baskaran, Hasventhran
Privacy Preserving Threat Hunting in Smart Home Environments 2020 Elmisery, Ahmed M.
Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey 2020 Alarqan, Mohammad Abdelkareem
Mobile Authentication Using Tapping Behavior 2020 Ponnusamy, Vasaki
The Impact of Different Feature Scaling Methods on Intrusion Detection for in- Vehicle Controller Area Network (CAN) 2020 Lokman, Siti-Farhana
STEM: Secure Token Exchange Mechanisms 2020 Darisi, Maneesh
Appraisal on User's Comprehension in Security Warning Dialogs: Browsers Usability Perspective 2020 Yi, Christine Lim Xin
Context-Based Blockchain Platform Definition and Analysis Methodology 2020 Ribeiro, Sérgio Luís
Alle Artikel auflisten